Cyber Security Book
Cyber Security Book
LEVEL I:
M.A Economics/ History/ Literature/M.Com
LEVEL II:
M.Sc Mathematics/Physics/Computer Science
Sri GVG Visalakshi College for Women (Autonomous), Udumalpet - 642128
Re-Accredited by A++ in NAAC
An ISO Certified Institution
Course framed by
Mrs. S.Kalaisevi, Associate Professor, Department of Mathematics
Cyber space
Cyberspace is "the notional environment in which communication over computer networks
occurs." It is a complex environment consisting of interactions between people, software and
services, supported by worldwide distribution of information and communication technology
(ICT), devices and networks.
Unlike most computer terms, "cyberspace" does not have a standard, objective definition.
Instead, it is used to describe the virtual world of computers. For example, an object in
cyberspace refers to a block of data floating around a computer system or network. With the
advent of the Internet, cyberspace now extends to the global network of computers. So, after
sending an e-mail to your friend, you could say you sent the message to her through cyberspace.
Cyber space is a domain characterized by the use of electronic and electromagnetic spectrum
to store, modify and exchange data via network systems and associated physical infrastructure.
The Cyber space is borderless and actions in the cyber space can be anonymous. These features
are being exploited by adversaries for perpetration of crime in the cyber space. The scale and
sophistication of the crimes committed in the cyber space is continually increasing thereby
affecting the citizens, business and Government. As the quantity and value of electronic
information have increased, the criminals and other adversaries embraced the cyber space as a
more convenient and profitable way of carrying out their activities anonymously. Every action
and reaction in cyberspace has some cyber legal perspectives. Cyber space includes Computer,
Mobile phone, ATM, Data storage device, Software, Network, Website, E-mail
Cyber law
Cyber law is a term used to describe the legal issues related to use of communications
technology, particularly "cyberspace", i.e. the Internet. It is less a distinct field of law in the way
that property or contract are as it is an intersection of many legal fields, including intellectual
property, privacy, freedom of expression, and jurisdiction. Cyber law is an attempt to integrate
the challenges presented by human activity on the Internet with legacy system of laws applicable
to the physical world.
Cyber law is the law which regulates the operations performed by the user via network by
electronic means. Cyber law is important because it touches almost all aspects of transactions
and activities involving the internet, World Wide. In other words, we can say cyber law regulates
the cyber space. Cyber means the use of Internet technologies and computers it includes
1
computers, networks, software, data storage devices, Internet, websites, emails, ATM machines
etc. To protect the cyber crime over Internet, this law is passed to protect the Internet cyber
crime. This law is approved by the government. Cyber law Includes: Cyber law encompasses
laws relating to
Cyber crimes
Electronic and digital signatures
Intellectual property
Data protection and privacy
2
Advantages of cyber law
Cyber law has the following advantages:
1. Cyber law regulates the transaction which is carried out through cyber space.
2. It provides legal infrastructure for e-Commerce transactions.
3. It authorized the certifying authorities for issuing digital signature certificates.
4. It validates the digital signature.
5. E-mail is considered as a valid message and legally acceptable in a court of law.
6. It is possible for the users to use against the fraudulent people who commit cyber crimes and
cause losses.
7. Statutory remedy is available for any losses which occur due to cyber crimes.
Authentication:
To verify the identity of the sender of the message to the intended recipient to prevent
spoofing or impersonation.
Authorization:
Authorization means to control the access to specific resources for unauthorized persons
Confidentiality:
To maintain the secrecy of the content of transmission between the authorized parties.
Confidentiality is the concealment of information or resources’. The need for keeping the
information secret arises from the use of computers in sensitive fields such as government and
industry. For example, military and civilian institutions in the government often restrict access
to information those who need that information. The first formal work in the computer security
3
was motivation of the military’s attempt to implement controls to enforce a “need to know”
principle. This principle also applies to industrial firms, which keep their proprietary designs
secure their competitors try to steal the designs. As a further example, all types of institutions
keep personnel records secret.
Access control mechanisms support confidentiality. One access control mechanism for
preserving confidentiality is cryptography, which scrambles data to make it incomprehensible. A
cryptography key controls access to the unscrambled data, but then the cryptographic key itself
becomes another datum to be protected.
Example: Enciphering an income tax return will prevent anyone from reading it. If the owner
needs to see the return, it must be deciphered. Only the possessor of the cryptographic key can
enter it into a deciphering program. However, if someone else can read the key when it is
entered into the program, the confidentiality of the tax return has been compromised.
Example: The user of Computer A sends a message to the user of the computer B. Another
user C get access to this message, which is not desired, and therefore, defeat the purpose of
confidentiality. For an example an email message is send by A to B, which is accessed by C
with the permission of both.
Integrity:
To ensure that no changes or errors are introduced in the messages during transmission.
Integrity refers to the trustworthiness of data or resources, and it is usually phrased in terms of
preventing improper or unauthorized changes. Integrity includes data integrity (the content of
the information) and origin integrity (the source of the data, often called authentication). The
source of the information may bear on its accuracy and creditability and on the trust that people
place in the information. This illustrates the principle that the aspect of integrity known as
creditability is central to the proper functioning of the system.
Integrity mechanisms fall into two classes: prevention mechanisms and detection
mechanisms. Prevention mechanisms seek to maintain the integrity of the data by blocking any
unauthorized attempts to change the data or any attempt to change the data in unauthorized ways.
The distinction between these two types is important. The former occur when a user tries to
change the data which has no authority to change. The latter occurs when a user authorized to
make certain changes in the data tries to change the data in the other ways.
4
Adequate authentication and access controls will generally stop the break-in from the
outside, but preventing the second type of attempt requires very different control. Detection
mechanisms do not try to prevent violations of integrity; they simply report that the data’s
integrity is no longer trustworthy. Detection mechanisms may analyze system events to detect
problems or may analyze the data itself to see if required or expected constraints still hold. The
mechanisms may report the actual cause of the integrity violations (a specific part of a file was
altered), or they may simply report that the file is now corrupt.
Working with integrity is very different from working with confidentiality. With
confidentiality, the data is either compromised or it is not, but integrity includes both the
correctness and the trustworthiness of the data. The origin of the data, how well the data is
protected before it arrived at the current machine, and how well the data is protected on the
current machine all affect the integrity of the data. Thus, evaluating integrity is often very
difficult, because it relies on assumptions about the source of the data and about trust in that
source-two underpinning of security that are often overlooked.
Non-repudiation:
To ensure that an entity cannot later deny the origin and receipt and contents of the
communication
There should be an appropriate institutional arrangement for key management and
authentication. This is normally done through Certification Agencies. For the banking and
financial sectors' the RBI should appoint a suitable agency/institution as the Certificate Agency.
There should also be an institutional arrangement for appropriate assessment of participants of
the financial network in terms of their credit-worthiness, financial soundness, etc. These
assessments will provide valuable input to the banking and financial sector.
Initially the Indian Financial Network (INFINET) will be a Closed Used Group (CUG)
network, but in due course this network will have to be connected to public networks like the
Society for World-wide Interbank Financial Telecommunication (SWIFT) etc. It is essential to
look at the possibility of having firewall implementations and they need to meet the following
criteria:
All in and out traffic must pass through the firewall. The firewall should check and
authorize the traffic. The firewall in itself should be immune to penetration.
Implementation of firewalls can be done using packet filtering routers, application and
circuit level gateways and also network translation devices.
State full multilayer inspection gateways combine the advantages of the above and also
give a better performance, flexibility and security. This environment can handle all kinds
of applications, namely, Transmission - Control Protocol (TCP), User Datagram Protocol
(UDP), Remote Procedure Call (RCP), Internet Control Message Protocol (ICPMP) etc.
New applications can be added easily and this environment is totally transparent to end-
users.
Firewalls are used to implement access control security as well as to provide for user
authentication and to ensure data integrity by using encryption. It is important that the
banks have their own security policy and then design security solutions accordingly.
Regular reviews of security Policies and their implementation are also important. Highly
secured (e.g., funds related), secured, non-secured messages should be clearly
demarcated in the security policy. Banks are, therefore, advised to have dedicated groups
with enough competence and capability. Since security is the prime concern for the
banking and financial sector, continuous research should be carried out as is done in the
internet community. Institution like IDRBT should have collaborative arrangements with
national and international agencies for carrying out research in this field. Such
5
Institutions could develop Tiger teams (hackers) and the banks can engage the team to
test and determine the strength of the firewall implementation.
Cyber law-Governance
Cyber law governs the four major parts. They are
1. Cyber crimes 3. Intellectual property and
2. Electronic signature 4. Data privacy
1. Cyber crimes
Cyber crimes are illegal activities done with the use of network linked technology.
Fraudulent people target the computers to attack the confidentiality and the information of the
victims. They use computers as a tool for cheating, gambling, illegal copying etc. Some of the
people commit a crime by downloading unauthorized software, contraband, stealing the trade
secrets, accessing the website in an unauthorized way. So it is more important to govern the
activities which are involved in cyber space.
2. Electronic signature
To make the electronic document genuine and legally acceptable, digital signature is
necessary. It authenticates the person who signs and the message as genuine and honest.
With the advancement in technology, the use of the internet for business transactions has
also increased. Most of the transactions require you to provide important information about
yourself. This information is processed to complete the transactions. However, the business
organizations need to verify that the information that you provide is correct and authentic. To
7
ensure this, a digital signature is used by users. A digital signature is similar to a handwritten
signature.
Functions of digital signature:
1. To authenticate the identity of the user of the signature.
2. To ensure that the contents of the signed documents cannot be changed or distorted.
3. To ensure non-repudiation that means the user of the signature cannot deny sending
the information that was digitally signed.
Digital signature provides improved security, which increases the confidence of the
user of digital information exchange.
Handwritten signature cannot be stolen but can be easily forged. However, digital
signature is impossible to forge. The only problem with the digital signature is that they can be
stolen if care is not taken. Therefore, digital signature should be kept confidentially.
To make the electronic document genuine and legally acceptable, digital signature is necessary.
It authenticates the person who signs and the message as genuine and honest. Unlike
handwritten signature, you can see multiple digital signatures in different ways for various
purposes. You can see the same signature whenever you have to authenticate a document.
However, you can have a number of digital signatures depending upon the requirement and
purpose.
Digital signatures are created using public key cryptography. When a user implements a
digital signature, two keys are generated. One of these keys is a private key that is kept secret.
The other is a public key, which is available to all. The private key is used to generate a digital
signature that is used to sign an electronic document.
Consider that you want to digitally sign an electronic document. First, a special function
in the encryption software automatically produces a unique summary of the document that has to
be encrypted. This summary is called a message digest. Then, the message digest is encrypted
with your private key to produce the digital signature.
After the signature is created, you send the original document and signature to the
recipient who uses your public key to verify the signature. The public key does not verify the
signature even if there is a minor alteration to the file. This is because the alteration results in a
different message digest. This ensures that the message that you send is not modified by anyone.
The signature is also not be verified if the private and public keys do not modified by anyone.
The signature is also not be verified if the private and public keys do not match.
A digital signature ensures that the receiver does not accept an altered message. Digital
signature also ensures non-repudiation. Non-repudiation is achieved through cryptography
methods. If an individual uses a digital signature, the signature prevents the individual from
denying having performed a particular action related to the digitally signed data. Digital
signature provides evidence to a third party that an action has occurred. Digital signatures can be
specifically used to provide evidence in the non-repudiation of approval, submission and receipt
during online transaction.
If person conducts transaction by using digital signature, it implies that the person has
used the private key. This private key is assumed to be in safe custody of the holder and is
inaccessible to the others. In addition it is not possible to forge the digital signature. Therefore
only the sender of the message could have generated the message that results in a transaction.
8
3. Data privacy
Data privacy is very much required for an individual corporation and government.
Normally password and encryption technology are used as a security measure to protect data in
cyber space. In spite of this, password is stolen and data is extracted. The password is stolen by
way of matching the dictionary words with the password. So everyone must be caution while
framing the password for data privacy. With encryption, the data can be securely transmitted via
internet. Encryption can protect the data at the simplest level by preventing other people from
reading it.
4. Intellectual property
Intellectual property refers to intangible or non-physical goods. It is protected by
copyright for written works, patents for inventions and trade marks for brands, names and logo.
Intellectual property relating to computer and other electronic means are legally covered under
cyber law.
e-Mudhra
e-Mudhra, a Certification Authority (CA), offers secure digital signatures through various
options tailored to suit individual as well as organizational needs.
A Digital Signature Certificate (DSC) is a secure digital key that certifies the identity of
the holder, issued by a Certifying Authority (CA). It typically contains your identity (name,
email, country, APNIC account name and your public key). Digital Certificates use Public Key
Infrastructure meaning data that has been digitally signed or encrypted by a private key can only
be decrypted by its corresponding public key. A digital certificate is an electronic "credit card"
that establishes your credentials when doing business or other transactions on the Web.Digital
Signature Certificates (DSC) along with digital signatures for specific needs such as Income Tax
filing, MCA, e-tendering, e-procurement and Foreign Trade.
As e-filing is made compulsory in ROC, every director / signing authority needs to have
their Digital Signature Certificate. Its now mandatory to obtain PAN Encryption Digital
Signature Certificate for any person who is required to sign manual documents and returns filed
with ROC as per MCA21. Also an Individual is required to obtain DSC with PAN Encryption
for e-filing his return with Income Tax, India.
Digital Signature Certificate is the upgraded version of previous Digital Signature
Certificate. By Using This Certificate You can Participate/Bid in Any Kind of On-line
Tenders/Auction across India. To participate in the e-tendering process, every vendor is required
to use a latest version of Digital Signatures Certificate.
Data Security:
In any electronic transactions data security is a must. Data security means protection of
database from hackers by using security measures. Unauthorized access of data or destruction of
data may lead to numerous problems for larger corporations and also for the personal home
users. Data security is an important area of concern for every business owner, consumer and for
the individual.
Fundamentals of data security requirements
The following are the basic security standards which technology must ensure:
I. Confidentiality
II. Integrity
III. Availability
9
Confidentiality
A secured system ensures the confidentiality of data. It allows individuals to see only the
data which they are supposed to see. Confidentiality has several aspects, which are discussed
below
a. Privacy of communications
b. Storage of sensitive data safely
c. Authenticated users
d. Access control
Privacy of communication
Privacy is a very broad concept. For the individual, it involves the ability to control the
spread of confidential information. In the business world, privacy may involve the ability to
keep trade secrets, proprietary information about products and processes, business strategies, as
well as marketing and sales plans. For Governments, privacy involves the ability to keep secrets
that affect the country’s interests.
Data Protection has been defined to include-
- The legal safeguards of people's rights to see what information may be held
about them in a computer database, and
- The protection from theft, destruction, or damages of software (programs) and
data held in a computer's memory. The second type of data protection is also often called data
security.
Examples of the former are Government departments and commercial companies that
hold personal data in computers. For example, a company may have a computer database listing
the names and addresses of the customers. At ax office may have a similar computerized list of
everyone who pays income tax. Some countries have laws giving various rights to people listed
in such database. In the UK, the 'Data Protection Act 1984' safeguards the individual's right to
see his or her database entries, alter inaccuracies, or in some cases have it deleted. According to
this Act, organization holding computerized personal data must register with the 'Data Protection
Registrar'. Organizations registered with the Data Protection Registrar must show any individual
whatever information they hold on that person, except in a few instances. Any organization that
ought to have registered, but has not registered, is committing a criminal offence. Similarly laws
operate in other countries also, especially in Europe.
Precautionary Measures
Data Protection has been defined to include-
- The legal safeguards of people's rights to see what information may be held
about them in a computer database, and
- The protection from theft, destruction, or damages of software (programs) and
data held in a computer's memory. The second type of data protection is also often called data
security.
10
Examples of the former are Government departments and commercial companies that
hold personal data in computers. For example, a company may have a computer database listing
the names and addresses of the customers. At ax office may have a similar computerized list of
everyone who pays income tax. Some countries have laws giving various rights to people listed
in such database. In the UK, the 'Data Protection Act 1984' safeguards the individual's right to
see his or her database entries, alter inaccuracies, or in some cases have it deleted. According to
this Act, organization holding computerized personal data must register with the 'Data Protection
Registrar'. Organizations registered with the Data Protection Registrar must show any individual
whatever information they hold on that person, except in a few instances. Any organization that
ought to have registered, but has not registered, is committing a criminal offence. Similarly laws
operate in other countries also, especially in Europe.
As far as the latter category is concerned, a technologically advanced India remains
handicapped for want of legal support in implementing many of the technological innovations.
The absence of law relating to digital signature and encryption prevents our company from
implementing Electronic Fund Transfer (EFT) in a big way, apart from depriving the country of
the benefits of E-Commerce. Apart from the above, the absence of law and legal deterrents
relating to computer crime emboldens many a computer criminal in the country to indulge in
computer crime. The absence of the provisions enabling electronic data as 'admissible evidence'
in the courts has put our country decades back to other nations.
Cyber Security
Introduction in Cyber Security
Cyber Security, also referred to as information technology security, applied to computing
devices such as computers and smart phones, as well as to both private and public computer
networks, including the whole Internet. It focuses on protecting computers, networks, programs
and data from unintended or unauthorized access, change or destruction.
Cyber Security is the process of applying security measures to ensure confidentiality,
integrity, and availability of data. Cyber Security attempts to assure the protection of assets,
which includes data, desktops, servers, buildings, and most importantly, humans. The goal of
cyber security is to protect data.
Governments, Financial institutions, Hospitals and other businesses collect the process
and store a great deal of confidential information on computers and transmit that data across
networks to other computers. With the growing volume and sophistication of cyber attacks,
ongoing attention is required to protect sensitive business and personal information, as well as
safeguard national security.
12
services that allow one computer on network to execute programs on another computer to gain
privileged access within a network.
Telnet an Internet tool for interactive use of remote computers, can help hackers discover
information and to plan other attacks. Hackers have used Telnet to access a computer mail port,
to monitor the messages, passwords and other information about user accounts and network
resources. These are the crimes hackers commit on the network.
Types of Hackers
Spy Hackers
Corporations hire hackers to infiltrate the competition and steal trade secrets. They may
hack in from the outside or gain employment in order to act as a mole. Spy hackers may use
similar tactics as hacktivists, but their only agenda is to serve their client’s goals and get paid.
Spoofing
Spoofing is the process of faking the websites or mails to trick users into passing along
critical information like credit card numbers or passwords.
A spoofing attack is user on a network; in order to launch attacks against network hosts,
steal data, spread malware etc. Many of the protocols do not provide mechanisms for
authenticating the source or destination of a message. They are thus vulnerable to spoofing
attacks when extra precautions are not taken by applications to verify the identity of the sending
or receiving host. Spoofing attacks which take advantage of protocols may be mitigated with the
use of firewalls capable of deep packet inspection or by taking measures to verify the identity of
the sender or recipient of a message.
Malicious Applets
A malicious applet is any applet that attacks the local system of a Web surfer. Malicious
applets are written by researchers, crackers, and Net miscreants to annoy and damage Java users.
They can even seriously damage a Java user's machine. These are tiny programs, written in the
popular java computer language, that misuse your computer resources, modify files on the hard
disk, send fake mails or steal passwords. Any applet that performs an action against the will of
the user who invoked it should be considered malicious.
These are tiny programs, sometimes written in the popular java computer language, that
misuse your computer resources, modify files on the hard disk, send fake mails or steal
passwords.
Logic bomb
A logic bomb is a piece of programming code buried within another programme,
designed to perform some malicious act. It is a piece of code intentionally inserted into a
software system that will set off a malicious function when specified conditions are met. For
example, a programmer may hide a piece of code that starts deleting important files of a
company or organization, which will lead problems to the organization.
Software that is inherently malicious, such as logic bombs that execute a certain payload
at a pre-defined time or when some other condition is met. This technique can be used by a virus
or worm to gain momentum and spread before being noticed. Some viruses attack their host
systems on specific dates, such as Wednesday the 12th or Independence Day. Viruses that
activate on certain dates are often called "Time bombs".
Threat
A threat is anything that can disrupt the operation, functioning, integrity, or availability of
a network or system.
Types of attacks:
Breaking into a system
Through violation of the authentication and access control objectives, the attackers obtain
the ability to control aspects of the behaviour of the communication system including the ability
to overcome confidentiality and integrity objectives.
Virus
A virus based attack manipulates a legitimate user to bypass authentication and access
control mechanisms in order to execute the malicious code injected by the attacker. Virus attacks
are often untargeted and spread among vulnerable systems and users. Virus attacks often directly
or indirectly decrease the availability of infected systems by consuming excessive amounts of
processing power or network bandwidth.
A virus is a computer program that attaches itself to another legitimate program and
causes damage to the computer system or to the network. During its life time, a virus goes
through four phases, they are:
Dormant phase: here, the virus is ideal. It get activated based on certain action or event (e.g. the
user typing a certain key or certain date or time is reached, etc). This is an optional phase.
Propagation phase: in this phase, a virus copies itself and each copy starts creating more copies
of self, thus propagating the virus.
Triggering phase: A dormant virus moves into this phase when the action/event for which it
was waiting is initiated.
Execution phase: This is the actual work of the virus, which could be harmless (display some
message on the screen) or destructive (delete a file on the disk).
15
Viruses can be classified into following categories:
Parasitic Virus: This is the most common form of viruses. Such a virus attaches itself to
executable files and keeps replicating. Whenever the infected file is executed, the virus looks for
other executable files to attach itself and spread.
Memory-Resident Virus: This type of virus first attaches itself to an area of the main memory
and then infects every executable program that is executed.
Boot sector virus: This type of virus infects the master boot record of the disks and spreads on
the disk when the operating system starts booting the computer.
Stealth virus: This virus has intelligence built in, which prevents anti-virus software program
from detecting it.
Polymorphic Virus: A virus that keeps changing its signature (i.e. Identity) on every execution,
making it very difficult to detect.
Metamorphic Virus: In addition to changing its signature like a polymorphic virus, this type of
virus keeps rewriting itself every time, making its detection even harder.
There is another popular category of viruses called as the macro virus. This virus affects
specific application software, such as Microsoft Word or Microsoft Excel. These viruses affect
the documents created by the users and spread quit easily since such documents are very
commonly exchanged over email. There is a feature called as macro these application software
programs, which allows the user to write small useful utility programs within the documents.
Viruses attack these macros and hence the name macro virus.
Trojan
A Trojan is a virus where the malicious functionally is hidden behind functionality that is
desired and used by the user. Trojans are typically employed to circumvent confidentiality or
access control objectives.
Worm
A worm is malicious code whose propagation mechanisms rely on automatic exploration
and exploitation of vulnerabilities in the targeted system, without involvement of any user.
Worm infections are untargeted and usually create availability problems for the affected system
or even the Internet as a whole.
Cracking
The term “cracking” means trying to get into computer systems in order to steal, corrupt,
or illegitimately view data. The popular press refers to such activities as hacking, but hackers see
themselves as expert, elite programmers and maintain that such illegitimate activity should be
called “cracking.”
The term cracker was coined by Richard Stallman. Crackers are unauthorized users who
attempt to obtain unauthorized access to remote systems. The nature of these attacks has changed
substantially over the last few years. Several years ago crackers sat at terminal entering
commands, waiting to see what would happen, and then entering commands. Today most
cracking attacks are automated and take of attack is sometimes called an asymmetric attack.
16
Data recovery
Data recovery is the process of handling the data; through the data is damaged, failed,
corrupted or cannot accessible from secondary storage media then it cannot be accessed
normally. The data are being kept in storage media such as internal or external hard disk drives,
pen drive, storage tapes, CDs, DVDs etc. Recovery is needed due to physical damage to the
storage device or logical damage to the file system that prevents it from being mounted by the
host operating system (OS).
The most common data recovery scenario involves an operating system failure,
accidental damage etc; in such case copy all wanted files to another disk. This can be easily done
by using a CD or pen drives. In order to move the files from the system disk to the backup media
file manager or optical disc authoring software is used.
In case of hard disk failure, the data cannot be easily read. The solutions are repairing the
file system, hard disk recovery techniques to recover the corrupted data, hardware-software
based recovery of damaged service areas to hardware replacement on a physically damaged disk.
If the Files erased, then the contents of deleted files are not removed immediately from
the drive; instead, references to them in the directory structure are removed, and the space they
occupy is made available for later overwriting. For the end users, deleted files are not
discoverable through a standard file manager, but that data still technically exists on the drive.
In the meantime, the original file contents remain, often in a number of disconnected
fragments, and may be recoverable. The Data recovery process is also used in forensic
applications.
17
Fig – 2.4 Sequential Access
Direct Access
Direct access file uses a physical medium and programming, which helps in the storage
and retrieval of specific records. These files are the heart of DBMS and most of today’s file
storage technology. Sometimes it is not necessary to process every record in a file. It may not be
necessary to process records in the order in which they are present. Most common device for
storing direct access files is magnetic disk.
Information present in a record can be accessed only if some key value in that record is
known. In all such cases, direct access is used. A file is a collection of physical blocks, and so
the records in any block can be accessed. For example, master files.
Databases are of this type since they allow query processing that involves immediate
access to large amounts of information. Not all operating systems support direct access files.
Usually files are to be defined as sequential or direct at the time of creation and accessed
accordingly later. All reservation systems fall into this category.
18
Methodology that helps in Remote Data recovery are:
Logical recovery of files & partition
After the drive has been ready to use, it is possible the retrieve the lost data. If the drive
has failed logically, there are a number of reasons for that. User can repair the files in order to
read the file system's data structure and retrieve stored data.
Repair the damaged files can be retrieved
Data loss or damage may occur when, for example, a file is written to a sector on the
drive that has been damaged. Corrupted documents can be recovered by several software
methods or by manually reconstructing the document using a hex editor.
Recover Swap File
Swap file is a file stored on the computer hard drive that is used as a temporary location
to store information that is not currently being used by the computer RAM. By using a swap file
a computer has the ability to use more memory than what is physically installed in the computer.
It is useful technique that enables a computer to execute programs and manipulate files
larger than main memory. The operating system copies as much data as possible into main
memory, and leaves the rest on the disk. The least recently used files in RAM can be "swapped
out" to hard disk until they are needed. New files can be "swapped in" to RAM. In larger
operating systems the units that are moved are called pages and the swapping is called paging.
Swap files are used in operating systems like Windows 7 and Windows Server 2008, as
virtual memory is a cheaper alternative to magnetic media. A typical swap file is equal to or
larger than the system's total installed physical memory. Although swap files provide additional
system memory, the data stored in swap files is typically less active and idle. The swap files can
be corrupted due to raw partition, virus attacks or system crash. User can get back the corrupted
files by using the recovery tools. These recovery tools helps in the maintenance of swap file data
in a secured way.
Recover Temporary Files
Deleted files are inaccessible. We can often recover them completely with professional
data recovery tools. Data recovery software is designed to locate any recoverable data and
providing it in a proper format. The best data recovery applications provide a preview of
recovered files, filtered and searchable results and easy file restoration
File recovery programs can be used to save files of any type or size, from pictures, music
and videos to documents and spreadsheets. Data recovery software can locate and restore emails,
19
executables and compressed files. The best file recovery software can even maintain the folder
organization of your files, and it may be able to recover a complete partition or drive.
Data recovery in Cache Files
A cache is a place to store something temporarily in a computing environment. The
active data is often cached to shorten data access times, reduce latency and improve input/output.
Because almost all application workload is dependent upon I/O operations, caching is used to
improve application performance.
The web browsers such as Internet Explorer, Firefox and Chrome use a browser cache to
improve performance for frequently accessed web pages. When you visit a webpage, browser
requests are stored on computing storage in the browser's cache. If you click "back" and return to
that page, your browser can retrieve most of the files it needs from cache instead of requesting
they all be sent again. This approach is called read cache. It is much faster for your browser to
read data from the browser cache than to have to re-read the files from the web page.
Types of cache
Write-around cache
It allows write operations to be written to storage, skipping the cache altogether. This
keeps the cache from becoming flooded when large amounts of write I/O occur. The
disadvantage is that data is not cached unless it is read from storage. As such, the initial read
operation will be comparatively slow because the data has not yet been cached.
Write-through cache
It writes data to both the cache and storage. The advantage to this approach is that newly
written data is always cached, thereby allowing the data to be read quickly. A drawback is that
write operations are not considered to be complete until the data is written to both the cache and
primary storage. This causes write-through caching to introduce latency into write operations.
Write-back cache
It is similar to write-through caching in that all write operations are directed to the cache.
The difference is that once the data is cached, the write operation is considered complete. The
data is later copied from the cache to storage. In this approach, there is low latency for both read
and write operations. The disadvantage is that, depending on the caching mechanism used, the
data may be vulnerable to loss until it is committed to storage.
20
Authentication
Authentication is how one proves that they are who they say they are. When you claim to
be Jane Smith by logging into a computer system as “jsmith”, it’s most likely going to ask you
for a password. You’ve claimed to be that person by entering the name into the username field
(that’s the identification part), but now you have to prove that you are really that person. Most
systems use a password for this, which is based on “something you know”, i.e. a secret between
you and the system.
Another form of authentication is presenting something you have, such as a driver’s
license, an RSA token, or a smart card. You can also authenticate via something you are. This is
the foundation for biometrics. When you do this, you first identify yourself and then submit a
thumb print, a retina scan, or another form of bio-based authentication.
Once you’ve successfully authenticated, you have now done two things: you’ve claimed
to be someone, and you’ve proven that you are that person. The only thing that’s left is for the
system to determine what you’re allowed to do.
Authentication Control
Authentication or identification is the first step in any access control solution. It is the
process of identifying the user to verify whether he/she is what he/she claims to be. Normally,
identification is done with the help of information that is known to everyone (i.e., user name or
user ID) and some personal information known only to the subject (i.e. password). Faced with
the threat of identity theft and increasing consequences associated with failing to secure
information, enterprises are increasingly looking for stronger forms of authentication to enhance
their overall security capabilities. At the same time,enterprises and governments need to take into
account other important considerations such as usability, total cost of deployment and
maintenance, and integration with existing security solution offerings. Usernames and passwords
are the most common authentication techniques. But most organizations do not depend on user
name authentication alone since username and passwords are an authentication solution for low-
value transactions and for accessing non-sensitive information over the network. Also,
experience has shown that usernames and passwords provide relatively weak authentication
because they can often be guessed or stolen. They are often difficult to deploy because each
application may implement its own scheme, adding to both development cost and user
complexity. Also, it is very difficult to maintain and reset the password. Determining the
appropriate level of authentication that meets your budget requirements is essential when
implementing your secure identity management solution. It is very crucial to identify the
appropriate authentication technique depending upon the nature of the business and sensitivity of
the information. One has to consider various authentication methods and their pros and cons. The
means of authentication are often discussed in terms of “factors” of proof, such as:
● Something you know to prove your identity (e.g., a PIN)
● Something you have to prove your identity (e.g., a smart card)
● Something you are to prove your identity (e.g., a fingerprint)
A good authentication technique contains at least two of the above methods. In a client server
environment, strong
Authentication is a combination of server and client authentication:
● Server authentication is when the server proves its identity to the client.
● Client authentication is when clients prove their identity to the server.
There are various authentication techniques that organizations can choose from. A quick
discussion on some of these techniques follows:
21
1. User Password Authentication
It is the most common form of providing identification. When user accesses the resource, access
control framework asks for the user name password provided to the user. The credentials are
validated against the one stored in the system’s repository.
2. Windows user based authentication
Usually, organizations have a list of users stored in the windows active directory. Access control
framework should be able to provide authentication for the user of the Primary Domain
Controller (PDC).
3. Directory based authentication.
With the rising volume of business over the web, millions of users often try to access the
resource simultaneously. In such a scenario, the authentication framework should be able to
provide for faster authentication. One such technique is Directory Based Authentication where
user credentials are validated against the one which is stored in the LDAP Directory.
4. Certificate based authentication
This is probably one of the strongest authentication techniques where the user is asked to provide
his/her digital ID.This digital ID, known as digital certificate, is validated against the trusted
authority that issued the digital ID. There are various other parameters that are checked to ensure
the identification of the user.
5. Smart card based authentication
This is also used as a second factor authentication. Smart cards are small devices containing co-
processors to process cryptographic data.
6. Biometrics
This is the strongest authentication. Known as third factor authentication, it is based on
something the user is. It works after the users have provided something they know (User name
password) and something they own (either a grid or token) or something they are (retina-scan,
thumbprint or thermal scan). It is required in cases where data is top confidential, such as in
Military/Defense.
7. Grid based Authentication
This is used as a second factor authentication. It authenticates the user based on something he
knows (User name password authentication) and then asks for something he owns (grid card
information). Entrust Identity Guard provides such an authentication.
8. Knowledge-based authentication
One of the simplest mechanisms for gaining additional confidence in a user's identity is to
challenge the user to provide information that an attacker is unlikely to be able to provide. Based
on "shared secrets", this allows for the organization to question the user, when appropriate, to
confirm information that is already known about the user through a registration process, or from
previous transactions.
9. Machine Authentication
Machine authentication provides validation of the user's computer in a way that secures against a
variety of threats in a zero touch fashion, reducing user impact. This is an especially effective
method of user authentication where users typically access their accounts from a regular set of
machines, allowing for stronger authentication to be performed without any significant impact on
the user experience.
10. One Time Password (OTP)
A one time [password is dynamically generated and it is valid only for once. The advantage of
one time password is that if an intruder hacks it, he cannot reuse it. There are two types of OTP
token generators: synchronous and asychronous. A synchronous token device synchronizes with
the authentication service by using time or an event as the core piece of the authentication
process. A token device, which is using an asynchronous token generating method, uses a
challenge response scheme to authenticate the user.
22
User names and Passwords
A usernames and password is like the combination for a combination lock or the PIN number for
an ATM card. It is a way of proving to a computer that you are who you claim to be.
Unfortunately, it can be compromised, just as a combination can be guessed, or all possible
combinations attempted, or someone can look over your shoulder as you key in your PIN.
In the past, password guessing was fairly difficult; however, this is no longer the case.
Hackers have ever-increasing resources and Caltech presents an attractive target, so all accounts
on all servers here need to be protected as much as is practical.
The system administrators make it as difficult for hackers as we can to prevent
compromise from the server side, but individual account security is dependent on the security of
each individual user names and password. This is why it is extremely important for you to use
passwords that cannot be guessed.
General Authentication
Password Authentication
Password authentication is the most common method of authentication. It is also the least
secure. Password authentication requires the identity to input a user id and a password in order to
login. Password length, type of characters used and password duration are password management
are now critical concern in enterprises. The ability to easily crack passwords has resulted in high
levels of identity theft. As a result, the high risk of passwords means most enterprises now
deploy a layered security strategy. A user enters in their id and password for initial login to gain
access to only low risk information and applications with other forms of authentication required
for higher risk information and applications.
Single Sign On Authentication
Single Sign On (SSO), Reduced Sign On (RSO), or Enterprise Single Sign On (ESSO) is
the ability to reduce the number of id's and passwords a user has to remember. In most
enterprises, a strong business case can be made to implement single sign on by reducing the
number of password related help desk calls. SSO is also the architecture to require stronger
forms of authentication for higher risk information and applications. Thus a user may login using
their id and password to gain general low risk access to an enterprise. The SSO software enables
them to not have to use multiple id's and passwords. However, when the user tries to access more
sensitive information and applications, the single sign on software will require the identity to
input stronger authentication such as a security token, a digital certificate and/or a biometric.
Lightweight Directory Access Protocol (LDAP) Authentication
Most enterprises use Lightweight Directory Access Protocol (LDAP) directories to
handle the centralized authentication. LDAP directories, such as Active Directory, Sun One
Directory, Novel e-Directory and other vendors, provide a low cost way of doing fast identity
look-ups and authentication as compared to traditional databases. Today it is also common to use
virtual LDAP directories to quickly integrate the identity and authentication information
contained in one or more databases and/or other LDAP directories. The use of these directories is
a critical piece of identity infrastructure that leads to integrating access control.
Access Control Authentication
Access control is the process of granting an identity the ability to physically or
electronically access a facility or enterprise. By using LDAP directories and single sign on, many
enterprises now integrate their building access control security cards, employee time keeping and
other access control accessories into their LDAP identity management system. This reduces the
number of identity database silos, since most access control systems use their own identity
databases. It also reduces the number of access control accessory systems.
Network Authentication
Network authentication is the process of granting an identity the ability authenticates to a
network as well as their authorization. Almost all network authentication systems are now LDAP
23
based. This includes Microsoft 2000, Linux, Solaris, AIX and HPUX. Many mainframe
authentication systems such as RACF are now LDAP enabled.
Biometric Authentication
Biometric authentication s is the process of taking a "piece of you", digitizing it and then
using this to authenticate against an identity directory or database. Typical types of biometric
authentications include finger scans, digital finger prints, hand scans, retina scans, digital
signature scans and others. The use of DNA biometrics is increasingly used in identity
verification (the initial identity registration step prior to authentication). Biometrics are
commonly used as part of an array of authentication methods used in enterprises.
Strong Authentication
Strong authentication means higher trust of an authentication. For instance, the successful
login using a id and password will be given a low level of trust by the enterprise since the id and
password are easily obtained by social engineering or password cracking. Stronger authentication
methods include digital certificates, security tokens and biometrics. Often, many enterprises use
combinations of these including passwords, to place a higher degree of trust for higher risk
applications or information access.
Transaction Authentication
Transaction authentication is the process of using other authentication determinants to
verify an identity. Often used by financial institutions for higher risk customers or transactions,
the transaction software looks at the IP address the user is coming in on, the identity's computer
hardware they're using, the time of day, the geo-location the identity is coming from, etc. If the
identity successfully logs on using a id and password BUT the other components are not usual,
the transaction authentication software may stop a process, flag in real time an administrator
and/or ask the user more questions to have more confidence the identity is who they claim to be.
Federated Authentication
Federated authentication is the ability to trust an incoming electronic identity to the
enterprise from a trusted partner or website. Protocols enabling this include SAML, Liberty
Alliance, Web Services Federation and Shibboleth. When combined with enterprise single sign
on systems, the user experience is improved since they no longer have to remember another id
and password. Further, enterprise identity authentication standards can be automatically enforced
on external identities using the enterprise systems. Identity authentication federation also works
in reverse for enterprise employees who access there 401k, benefits, etc, to outside supplier
websites. By using federated authentication, the identity doesn't need to remember another
separate id and password.
PKI Authentication
Public key infrastructure (PKI) authentication, is another way of doing identity
authentication. An identity is given a digital certificate by an Certificate Authority (CA). This is
then presented during the authentication process to verify an identity is who they say they are.
The level of authentication trust varies for digital certificates depending on the level of identity
verification done during the identity registration process as well as the digital certificate
revocation process. Digital certificates are becoming more important to authenticate and verify
an identity in single sign on systems, document management systems and in web services.
Security Token Authentication
Security token authentication, such as RSA secureID tokens, are used to authenticate an
identity (something that you have). During the login process, or if required by a single sign on
system for a higher risk application, the identity is required to enter in the numbers appearing on
the token screen along with their id. Since the numbers change randomly to the user viewing the
screen (but is understood by the central authentication server), there is a higher degree of trust
associated with this form of authentication. However, operating costs for security authentication
24
tokens are higher than the use of password and id since they must be physically issued, replaced
and recovered.
Smart Card Authentication
Smart cards are another form of authentication token (something you have). Often they
contain a digital certificate as well as additional identity attribute information. Smart card
authentication is becoming wide spread. The same smart cards used in an authentication process
are now commonly used as well for access control mechanisms to enter physical facilities,
buildings, floors and rooms.
Authentication Management
Authentication management is the overall process of managing identities and their
authentication mechanisms. In most enterprise authentication management involves
authentication policies and processes to manage passwords, digital certificates, security tokens,
access control, biometrics, smart cards, LDAP directories, transaction authentication, single sign
on and identity authentication federation. Strong business cases can be made to lower
authentication costs while at the same time strengthening overall enterprise security.
Wireless Authentication
Authenticating wireless devices is today becoming a main enterprise security
issue. Often, the authentication used is very insecure or easily breached. There are however
ways to increase reliability that the user is who they claim to be by using multi-factor
authentication.
Document Authentication
Formely separate document authentication systems are now becoming intertwined with
enterprise identity and authentication mechanisms. Gone are the days of relying upon mostly
passwords to authenticate users trying to open document. Formerly separate document
authentication systems are now becoming intertwined with enterprise identity and authentication
mechanisms. Gone are the days of relying upon mostly passwords to authenticate users trying to
open documents.
Outsourcing Authentication
Many modern enterprises have outsourced portions of their authentication development,
maintenance and troubleshooting. If done well it can save the enterprise money. If done poorly,
it can create security holes or, cause enterprise failures.
Usernames and Password for Identification and Authentication
A common way to authenticate users is to assign each authorized user of a specific
system a unique username/password combination. The username identifies the user and
the password authenticates him; in other words, a human user proves his/her identity is true to
the nonhuman system. A password is “a word, a phrase, or combination of miscellaneous
characters that authenticates the identity of the user”. However, the only matter that is sure is that
the username and password combination agrees with a username/password combination in the
system’s database of valid and authorized users. If the user logs into the system remotely, the
only element that the system is sure of is the combination entered matches a stored combination
for a user of the system.
Rubens emphasized that the Gartner research house reported 94% of businesses only
require a username/password combination to log into their respective computer systems. That
popularity and reliance illustrates a lot of commercial trust in the simple philosophy of
identification and authentication of access. Passwords are a simpler and cheaper security
measure compared to other security hardware and software. Passwords can protect users’
personal information such as private documents, financial data, identity data, or social security
numbers. Passwords can also protect professional data, which could mean intellectual property,
trade secrets, financial data, human resource records, or customer information. The access or loss
25
of any of this data in the hands of the wrong party could be detrimental and disabling to the
person, the profession, or the proprietor.
As Schneier cautioned, “The problem with passwords is that they’re too easy to lose
control of. People give them to other people. People write them down, and other people read
them. People send them in email, and that email is intercepted. People use them to log into
remote servers, and their communications are on. They’re easy to guess. And once that happens,
the password no longer works as an authentication token because you can’t be sure of who is
typing that password in”.
The commonality in all of these passwords flukes is “people”—humans with that
imperfect human nature that corporations trust their most valuable asset to in the security
framework.
The popularity of username/password combinations reveals the reliance corporations and
institutions have on people keeping their passwords private. Considering the unpredictable and
imperfect human nature of people, the key to security with username/password combinations is
educating and training the users to exercise a regimen that safeguards and secures accurate
identification and authentication of the user.
Password authentication
In password-authenticated key agreement method is an interactive method for two or more
parties to establish cryptographic keys based on one or more party's knowledge of a password.
An important property is that an eavesdropper or man in the middle cannot obtain enough
information to be able to brute force guess a password without further interactions with the
parties for each (few) guesses. This means that strong security can be obtained using weak
passwords.
Types
Password-authenticated key agreement generally encompasses methods such as:
● Balanced password-authenticated key exchange
● Augmented password-authenticated key exchange
● Password-authenticated key retrieval
● Multi-server methods
● Multi-party methods
In the most stringent password-only security models, there is no requirement for the user of the
method to remember any secret or public data other than the password.
Password authenticated key exchange (PAKE) is where two or more parties, based only on
their knowledge of a password, establish a cryptographic key using an exchange of messages,
such that an unauthorized party (one who controls the communication channel but does not
possess the password) cannot participate in the method and is constrained as much as possible
from brute force guessing the password. (The optimal case yields exactly one guess per run
exchange.) Two forms of PAKE are Balanced and Augmented methods.
Balanced PAKE allows parties that use the same password to negotiate and authenticate a shared
key. Examples of these are:
● Encrypted Key Exchange (EKE)
● PAK and PPK
● SPEKE (Simple password exponential key exchange)
● Dragonfly-- IEEE Std 802.11-2012, RFC 5931, RFC 6617
● J-PAKE (Password Authenticated Key Exchange by Juggling) -- A variant that is
probably not encumbered by patents.
Augmented PAKE is a variation applicable to client/server scenarios, in which the server does
not store password-equivalent data. This means that an attacker that stole the server data still
26
cannot masquerade as the client unless they first perform a brute force search for the password.
Examples include:
● AMP
● Augmented-EKE
● B-SPEKE
● PAK-Z
● SRP (Secure Remote Password protocol) -- designed to be not encumbered by patents.
Password-authenticated key retrieval is a process in which a client obtains a static key in a
password-based negotiation with a server that knows data associated with the password, such as
the Ford and Kaliski methods. In the most stringent setting, one party uses only a password in
conjunction with N (two or more) servers to retrieve a static key. This is completed in a way that
protects the password (and key) even if N-1 of the servers are completely compromised.
Protecting Password
A Strong Password that is memorized, never reused, and never shared with anyone, is a
very secure password.
The problem is, the more accounts we have, the more passwords we have. On top of that,
the more complex we are forced to make those passwords, the harder it is to simply memorize all
of them.
Sometimes when we near a breaking point for mentally managing our passwords, we start
cutting corners. We make our passwords simpler. We use the same password for multiple
accounts. Or even worse, we start writing down our passwords in little notebooks. Or we attach
Post-It-Notes to our computer, displaying our passwords for anyone that walks past.
If you are in the habit of cutting corners in any of the ways listed (or any other way that
could easily reveal your password), it's time to break those habits right now. Destroy those post-
it-notes, never use "password" as a password again, and make sure your password for the
celebrity gossip web site isn't the same as your credit card password.
Password Managers helps the people to remember their passwords. Password
managers allow you to securely store all of your passwords in one encrypted location that no one
can access without logging in. All you have to do is remember your master password to unlock
your password manager and get to your passwords.
Characteristics of weak passwords
Based on common dictionary words
Including dictionary words that have been altered:
Reversed (e.g., “terces”)
Mixed case (e.g., SeCreT)
Character/Symbol replacement (e.g., “$ecret”)
Words with vowels removed (e.g., “scrt”)
Based on common names
Based on user/account identifier
Short (under 6 characters)
Based on keyboard patterns (e.g., “qwerty”)
Composed of single symbol type (e.g., all characters)
Resemble license plate values are difficult for you to remember
Protected Password
A strong password is one that’s hard to crack. A strong password must have all of the following:
Your password must be no fewer than eight (8) characters in length. However, a good
choice is a "pass phrase" composed of four (4) words and punctuation. A pass phrase is
a longer version of a password and is therefore more secure. A pass phrase is typically
composed of multiple words.
o Note: Though technology constraints may impose maximum length or other restrictions,
use of pass phrases shall be supported where possible and practical.
o Examples of pass phrases:
I like ice cream.
Turn Off Cell Phones!
It was hot today.
Cal Poly Broncos rule!
At least three of the following four types of characters:
o It must have at least one number.
o It must have at least one uppercase letter.
o It must have at least one lowercase letter.
o It must have at least one symbol (!,@,#,$,^).
28
Examples of Extremely Bad Passwords
Your name in any form - first, middle, last, maiden, spelled backwards, nickname or initials
Your user ID or your user ID spelled backwards
Part of your user ID or name
Any common name, such as Joe
The name of a close relative, friend or pet
Your phone number, office number or address
Your birthday or anniversary date
Simple variants of names or words (even foreign words), simple patterns, famous equations
or well-known values
Your favorite sports team (NFL, NBA, MLB, etc.)
Your license plate number, your social security number or any all-numeral password
Names from popular culture (e.g.: Beatles, Spiderman, etc.)
Creating a Stronger Password
You should follow these guidelines when creating a password:
Do not use your user name or any part of your real name.
Do not use a single word in a common language. There are tools for hackers that search
through electronic dictionaries, trying every word.
Avoid characters other than those above, such as accented characters (áèôü) or characters
from other alphabets (Ρωσικά, Греческий). The basic system will handle these passwords,
but you may not be able to enter them correctly on web pages.
Spell a word backwards (anomopyloplac1#).
Insert a number (calpo7lyPomona) or punctuation (go!Broncos).
Use weird capitalization (remember that it counts), or combine words (broNCOsrOOL!)).
Use the first letters of each word in a phrase (“I can never remember my stupid password!” =
Icnrmsp!).
Combine things you will remember ("I like to eat broccoli and listen to Beethoven =
broCColi@bEEthoven).
Consider using a pass phrase instead of a password.
Password Managers
A password manager is software for storing all your passwords in one location that is protected
and accessible with one easy-to-remember master passphrase. It is one of the best ways to keep
track of each unique password or passphrase that you have created for your various online
accounts—without writing them down on a piece of paper and risking that others will see them.
When using a password manager, you have one master passphrase that protects all of your other
passwords. This leaves you with the ease of having to remember only one.
Types of Password Managers
As Neil Randall pointed out in PC Magazine over a decade ago, “Password management
utilities have proliferated with the growth of the Internet and, as Web users log on to more and
more password-protected sites, have become almost indispensable tools.” There are many types
of password managers. A desktop password manager is software you install on your computer’s
hard drive; it stores your user name and password only on that computer. You can use a portable
password manager on your smart phone and other portable devices. Or you may choose to store
your passwords on the website of a password management provider or choose multi-factor
authentication, where you use a combination of ways to access a password manager on your
desktop; for example, a smartcard or USB drive plus a password or, perhaps, a fingerprint. Some
password managers can create new passwords for you. This eliminates the need for you to come
up with dozens of unique and complex passwords and passphrases. In PC World, Paul Mitchell
describes a new type of password manager that eliminates the worry about where your password
manager is located: “The makers of an emerging breed of password managers are striving to
29
provide secure online access to your passwords in the cloud and give you a synchronized, local
copy of your password database on every computer and mobile device, no matter what operating
systems, browsers or mobile platforms you use.” If all the information is stored in the cloud, you
can access it from any of your devices at any time. Moreover, in effect, the cloud provider
creates a backup of your password manager file. If you do not regularly back up your desktop
files, a cloud-based password manager may have important features for you to consider.
Choosing a Password Manager
Consider the type of password manager that best suits how and where you work. This is
where research into the type of password manager is necessary. Ask yourself what type of
passwords you will be storing and where you will most often access these sites. For example, if
you have passwords only for sites that you access at home, you would not need the password
manager to be stored on your mobile device. If you store a password manager on one computer
and need to access your passwords on another computer, you run into problems. On the other
hand, if you are using only one computer, the storage decision becomes easier. If you use a
generator of one-time passwords for all your accounts, you do not have a set of passwords to
store—though you may have a set of usernames.1 You need to consider whether acquiring a
password manager is the best way to handle your usernames. If you have a mix of passwords you
choose and one-time passwords that are generated for you, a password manager can be useful for
the passwords you choose.
After you know your needs, you can investigate particular products. When researching
the products, determine the security measures of each. Does the password manager use strong
encryption? Does it have a lockout feature? Does it include protection from malicious activity,
such as keystroke logging—and which kinds of activity? Evaluate ease of use and convenience.
Look at the functionality and the interface features and think about how you will like them over
the long term. Also examine support from the vendor/provider.
Look for (and evaluate) online documentation, and find out how the company interacts
with its customers: email? telephone? chat? other ways? Consider cost. Is there a one-time cost
or a recurring fee? Some password manager vendors provide a free trial period or charge for
certain features. If the latter, which features do you consider worth the cost? Supplement your
own evaluation by searching the web for articles on the top-rated password manager and
analyses of the strengths and weaknesses of various products Finally keep risks in mind.
Note particularly that there is both convenience and risk associated with storing your
passwords in the cloud, as noted in a previous US-CERT paper2 and there is the potential for
attacks on cloud password managers. In May 2011, Brennan Slattery, reported in a PC World
that the provider of an online password manager identified unusual network traffic of a size that
could indicate an email address and password compromise.
All customers were asked to change their master password. Remember also that there is a
risk with using your password manager in public locations, specifically if you leave the password
manager open in the background on the computer. Also if you open your password manager on a
public computer you may be taking the risk of key logging software being installed on the
computer. This software can capture the information that you type on the keyboard, and a
malicious user could steal your master password. In all cases, you must protect your master
password well; it’s best to memorize it rather than write it down.
30
L
LEEV
VEEL
L IIII
In today's environment, technology has made to access the information worldwide
quicker and easier. Telecommunication made everyone to capture, store and transmit the
information to every nook and corner of the world. The rapid development of information
technology provides new possibilities for automating tasks and enriching the lives of the people.
Technology refers to methods, tools, procedures to handle applied input and output
relations to perform a specific task. Technology which is adopted to store, process and transmit
the information from one place to another place is called Information Technology. Computer and
other electronic devices like ATM, mobile phones are used to store data, process data and
transmit the data to the place we need.
Cyber means the use of Internet technologies and computers. It includes computers,
networks, software, data storage devices, Internet, websites, emails, ATM machines etc. Cyber
security is security applied to computers, computer networks, and the data stored and
transmitted over them. The field is of growing importance due to the increasing reliance of
computer systems in most societies.
Cyber space
Cyberspace is "the notional environment in which communication over computer networks
occurs." It is a complex environment consisting of interactions between people, software and
services, supported by worldwide distribution of information and communication technology
(ICT), devices and networks.
Unlike most computer terms, "cyberspace" does not have a standard, objective definition.
Instead, it is used to describe the virtual world of computers. For example, an object in
cyberspace refers to a block of data floating around a computer system or network. With the
advent of the Internet, cyberspace now extends to the global network of computers. So, after
sending an e-mail to your friend, you could say you sent the message to her through cyberspace.
Cyber space is a domain characterized by the use of electronic and electromagnetic spectrum
to store, modify and exchange data via network systems and associated physical infrastructure.
The Cyber space is borderless and actions in the cyber space can be anonymous. These features
are being exploited by adversaries for perpetration of crime in the cyber space. The scale and
sophistication of the crimes committed in the cyber space is continually increasing thereby
affecting the citizens, business and Government. As the quantity and value of electronic
information have increased, the criminals and other adversaries embraced the cyber pace as a
more convenient and profitable way of carrying out their activities anonymously. Every action
and reaction in cyberspace has some cyber legal perspectives. Cyber space includes Computer,
Mobile phone, ATM, Data storage device, Software, Network, Website, E-mail
Cyber law
Cyber law is a term used to describe the legal issues related to use of communications
technology, particularly "cyberspace", i.e. the Internet. It is less a distinct field of law in the way
that property or contract are as it is an intersection of many legal fields, including intellectual
property, privacy, freedom of expression, and jurisdiction. Cyber law is an attempt to integrate
the challenges presented by human activity on the Internet with legacy system of laws applicable
to the physical world.
Cyber law is the law which regulates the operations performed by the user via network by
electronic means. Cyber law is important because it touches almost all aspects of transactions
and activities involving the internet, World Wide. In other words, we can say cyber law regulates
31
the cyber space. To protect the cyber crime over Internet, this law is passed to protect the
Internet cyber crime. This law is approved by the government.
Cyber law includes and encompasses laws relating to
Cyber crimes
Electronic and digital signatures
Intellectual property
Data protection and privacy
1. Cyber crimes
Cyber crimes are illegal activities done with the use of network linked technology. Fraudulent
people target the computers to attack the confidentiality and the information of the victims. They
use computers as a tool for cheating, gambling, illegal copying etc. Some of the people commit a
crime by downloading unauthorized software, contraband, stealing the trade secrets, accessing
the website in an unauthorized way. So it is more important to govern the activities which are
involved in cyber space.
2. Electronic signature
With the advancement in technology, the use of the internet for business transactions has
also increased. Most of the transactions require you to provide important information about
yourself. This information is processed to complete the transactions. However, the business
organizations need to verify that the information that you provide is correct and authentic. To
ensure this, a digital signature is used by users. A digital signature is similar to a handwritten
signature.
Functions of digital signature:
4. To authenticate the identity of the user of the signature.
5. To ensure that the contents of the signed documents cannot be changed or distorted.
6. To ensure non-repudiation that means the user of the signature cannot deny sending
the information that was digitally signed.
Digital signature provides improved security, which increases the confidence of the
user of digital information exchange.
Handwritten signature cannot be stolen but can be easily forged. However, digital signature is
impossible to forge. The only problem with the digital signature is that they can be stolen if care
is not taken. Therefore, digital signature should be kept confidentially.
To make the electronic document genuine and legally acceptable, digital signature is necessary.
It authenticates the person who signs and the message as genuine and honest. Unlike
handwritten signature, you can see multiple digital signatures in different ways for various
purposes. You can see the same signature whenever you have to authenticate a document.
However, you can have a number of digital signatures depending upon the requirement and
purpose.
Digital signatures are created using public key cryptography. When a user implements a
digital signature, two keys are generated. One of these keys is a private key that is kept secret.
The other is a public key, which is available to all. The private key is used to generate a digital
signature that is used to sign an electronic document.
Consider that you want to digitally sign an electronic document. First, a special function
in the encryption software automatically produces a unique summary of the document that has to
be encrypted. This summary is called a message digest. Then, the message digest is encrypted
with your private key to produce the digital signature.
33
After the signature is created, you send the original document and signature to the
recipient who uses your public key to verify the signature. The public key does not verify the
signature even if there is a minor alteration to the file. This is because the alteration results in a
different message digest. This ensures that the message that you send is not modified by anyone.
The signature is also not be verified if the private and public keys do not modified by anyone.
The signature is also not be verified if the private and public keys do not match.
A digital signature ensures that the receiver does not accept an altered message. Digital
signature also ensures non-repudiation. Non-repudiation is achieved through cryptography
methods. If an individual uses a digital signature, the signature prevents the individual from
denying having performed a particular action related to the digitally signed data. Digital
signature provides evidence to a third party that an action has occurred. Digital signatures can be
specifically used to provide evidence in the non-repudiation of approval, submission and receipt
during online transaction.
If person conducts transaction by using digital signature, it implies that the person has
used the private key. This private key is assumed to be in safe custody of the holder and is
inaccessible to the others. In addition it is not possible to forge the digital signature. Therefore
only the sender of the message could have generated the message that results in a transaction.
3. Data privacy
Data privacy is very much required for individual business establishments’ educational
institutions and government. Normally password and encryption technology are used as a
security measure to protect data in cyber space. In spite of this, password is stolen and data is
extracted. The password is stolen by way of matching the dictionary words with the password.
So everyone must be cautious while framing the password for data privacy. With encryption, the
data can be securely transmitted via internet. Encryption can protect the data at the simplest
level by preventing other people from accessing it.
4. Intellectual property
Intellectual property refers to intangible or non-physical goods. It is protected by copyright
for written works, patents for inventions and trade marks for brands, names and logo. Intellectual
property relating to computer and other electronic means are legally covered under cyber law.
Electronic Banking
Cyber Law has a very vital role to play at the application level, because of the critical
nature of financial data transfer. The financial messages should have the under noted features:
- The receipt of the message at the intended destination (data transmission)
- The content of the message should be the same as the transmitted one (data integrity)
- Sender of the information should be able to verify its receipt by the recipient (data
acknowledgement)
- Recipient of the message could verify that the sender is indeed the person (data
authenticity)
-Information in transit should not be observed, altered or extracted (data security)
- Any attempt to tamper with the data in transit will need to be revealed (data security)
- Non-repudiation (non repudiation of the data)
These features take down essentially to
- Authentication
- Authorization
- Confidentiality
- Integrity
-Non-repudiation
Authentication:
To verify the identity of the sender of the message to the intended recipient to prevent
spoofing or impersonation
Authorization:
Authorization means to control the access to specific resources for unauthorized persons
Confidentiality:
To maintain the secrecy of the content of transmission between the authorized parties.
Confidentiality is the concealment of information or resources’. The need for keeping the
information secret arises from the use of computers in sensitive fields such as government and
industry. For example, military and civilian institutions in the government often restrict access to
information those who need that information. The first formal work in the computer security
was motivation of the military’s attempt to implement controls to enforce a “need to know”
37
principle. This principle also applies to industrial firms, which keep their proprietary designs
secure their competitors try to steal the designs. As a further example, all types of institutions
keep personnel records secret.
Access control mechanisms support confidentiality. One access control mechanism for
preserving confidentiality is cryptography, which scrambles data to make it incomprehensible. A
cryptography key controls access to the unscrambled data, but then the cryptographic key itself
becomes another datum to be protected.
Example: Enciphering an income tax return will prevent anyone from reading it. If the owner
needs to see the return, it must be deciphered. Only the possessor of the cryptographic key can
enter it into a deciphering program. However, if someone else can read the key when it is
entered into the program, the confidentiality of the tax return has been compromised.
Example: The user of Computer A sends a message to the user of the computer B. Another user
C get access to this message, which is not desired, and therefore, defeat the purpose of
confidentiality. For an example an email message is send by A to B, which is accessed by C with
the permission of both.
Other system-dependent mechanisms can prevent processes from illicitly accessing
information. Unlike enciphered data, however, data protected only by these controls can be read
when the controls fail or bypassed. Then their advantage is off-set by a corresponding
disadvantage. They can protect the secrecy of data more completely than cryptography, but if
they fail or evade, the data becomes visible.
Confidentiality also applies to the existence of data, which is sometimes more revealing
than the data itself. Access control mechanisms sometimes conceal the mere existence of data;
less the existence itself reveal information that should be protected.
Resource hiding is another important aspect of confidentiality. Sites often wish to
conceal their configuration as what systems that are using; organization may not wish others to
know about specific equipment because it could be used without authorization or in
inappropriate ways, and a company renting time from a service provider may not want others to
know what resources it is using. Access control mechanisms provide these capabilities as well.
All the mechanisms that enforce confidentiality require supporting services from the
system. The assumption is that security services can rely on the kernel, and other agents, to
supply correct data. Thus, assumptions and trust underlie confidentiality mechanisms.
Integrity:
To ensure that no changes or errors are introduced in the messages during transmission.
Integrity refers to the trustworthiness of data or resources, and it is usually phrased in terms of
preventing improper or unauthorized changes. Integrity includes data integrity (the content of
the information) and origin integrity (the source of the data, often called authentication). The
source of the information may bear on its accuracy and creditability and on the trust that people
place in the information. This illustrates the principle that the aspect of integrity known as
creditability is central to the proper functioning of the system.
Integrity mechanisms fall into two classes: prevention mechanisms and detection
mechanisms. Prevention mechanisms seek to maintain the integrity of the data by blocking any
unauthorized attempts to change the data or any attempt to change the data in unauthorized ways.
The distinction between these two types is important. The former occur when a user tries to
change the data which has no authority to change. The latter occurs when a user authorized to
make certain changes in the data tries to change the data in the other ways.
Adequate authentication and access controls will generally stop the break-in from the outside,
but preventing the second type of attempt requires very different control. Detection mechanisms
do not try to prevent violations of integrity; they simply report that the data’s integrity is no
longer trustworthy. Detection mechanisms may analyze system events to detect problems or may
analyze the data itself to see if required or expected constraints still hold. The mechanisms may
38
report the actual cause of the integrity violations (a specific part of a file was altered), or they
may simply report that the file is now corrupt.
Working with integrity is very different from working with confidentiality. With
confidentiality, the data is either compromised or it is not, but integrity includes both the
correctness and the trustworthiness of the data. The origin of the data, how well the data is
protected before it arrived at the current machine, and how well the data is protected on the
current machine all affect the integrity of the data. Thus, evaluating integrity is often very
difficult, because it relies on assumptions about the source of the data and about trust in that
source-two underpinning of security that are often overlooked.
Non-repudiation:
To ensure that an entity cannot later deny the origin and receipt and contents of the
communication
There should be an appropriate institutional arrangement for key management and
authentication. This is normally done through Certification Agencies. For the banking and
financial sectors' the RBI should appoint a suitable agency/institution as the Certificate Agency.
There should also be an institutional arrangement for appropriate assessment of participants of
the financial network in terms of their credit-worthiness, financial soundness, etc. These
assessments will provide valuable input to the banking and financial sector.
Initially the Indian Financial Network (INFINET) will be a Closed Used Group (CUG)
network, but in due course this network will have to be connected to public networks like the
Society for World-wide Interbank Financial Telecommunication (SWIFT) etc. It is essential to
look at the possibility of having firewall implementations and they need to meet the following
criteria:
- All in and out traffic must pass through the firewall. The firewall should check and authorize
the traffic. The firewall in itself should be immune to penetration.
- Implementation of firewalls can be done using packet filtering routers, application and circuit
level gateways and also network translation devices.
- State full multilayer inspection gateways combine the advantages of the above and also give
a better performance, flexibility and security. This environment can handle all kinds of
applications, namely, Transmission - Control Protocol (TCP), User Datagram Protocol (UDP),
Remote Procedure Call (RCP), Internet Control Message Protocol (ICPMP) etc. New
applications can be added easily and this environment is totally transparent to end-users.
-Firewalls are used to implement access control security as well as to provide for user
authentication and to ensure data integrity by using encryption. It is important that the banks
have their own security policy and then design security solutions accordingly. Regular reviews of
security Policies and their implementation are also important.
Highly secured (e.g., funds related), secured, non-secured messages should be clearly
demarcated in the security policy. Banks are, therefore, advised to have dedicated groups with
enough competence and capability.
Since security is the prime concern for the banking and financial sector, continuous
research should be carried out as is done in the internet community. Institution like IDRBT
should have collaborative arrangements with national and international agencies for carrying out
research in this field. Such Institutions could develop Tiger teams (hackers) and the banks can
engage the team to test and determine the strength of the firewall implementation.
Hackers
Hacking in computers is the unauthorized access and use of networked computer systems.
Hackers can be outsiders or company members. They can use the Internet to steal or damage the
data.
Some hackers who commits only electronic breaking and entering; they can access the
system and reads some files but neither steals nor damages anything. Hackers can monitor mails,
file transfers to extract passwords and also steal network files. A hacker may also use remote
services that allow one computer on network to execute programs on another computer to gain
privileged access within a network.
Telnet an Internet tool for interactive use of remote computers, can help hackers discover
information and to plan other attacks. Hackers have used Telnet to access a computer mail port,
to monitor the messages, passwords and other information about user accounts and network
resources. These are the crimes hackers commit on the network.
40
Common Hacking Tactics
Denial of Service
This is a common networking prank. By hammering a website’s equipment with too
many requests for information, an attacker can effectively clog the system, slowing the
performance or even crashing the system. This method of overloading the computers is
sometimes used to cover up an attack.
Hackers use Denial of Service (DoS) attacks to prevent legitimate uses of computer
network resources. DoS attacks are characterized as
Attempts to flood a network.
Attempts to disrupt connections between two computers.
Attempts to prevent an individual from accessing a service.
Attempts to disrupt service to a specific system or person.
Those on the receiving end of a DoS attack may lose valuable resources, such as their e-
mail services, Internet access or their Web server. Some DoS attacks may eat up all your
bandwidth or even use up all of a system resource, such as server memory.
Sniffer
Sniffer is the programs that secretly search individual packets of data as they pass
through the internet, capturing the passwords and contents. It is also called as spoofer. It is a
standalone program to intercept and analyze certain data. For example a sniffer can intercept and
analyze network traffic and catch certain data, for example passwords. Trojans sometimes use
sniffing capabilities to steal passwords and user information from infected computers. There also
exist a lot of commercial and free sniffers. They can be used to analyze network traffic for
performance, security issues and faults.
Sniffer is a Network analyzing tool. Network analyzing tools are used to monitor the
traffic conversations that occur across the network. Often the information obtained from a sniffer
can be used to figure out exactly how devices are communicating. But the use of a sniffer is not
limited to troubleshooting, it can also be used to help train, design and operate devices on a
network.
Spoofing
Spoofing is the process of faking the websites or mails to trick users into passing along
critical information like credit card numbers or passwords.
A spoofing attack is user on a network; in order to launch attacks against network hosts,
steal data, spread malware etc. Many of the protocols do not provide mechanisms for
authenticating the source or destination of a message. They are thus vulnerable to spoofing
attacks when extra precautions are not taken by applications to verify the identity of the sending
or receiving host. Spoofing attacks which take advantage of protocols may be mitigated with the
use of firewalls capable of deep packet inspection or by taking measures to verify the identity of
the sender or recipient of a message.
Trojan horse
Trojan horse is a malicious, security breaking program that is disguised as something
benign, such as directory lister, archiver, and game. Trojan is a type of virus that normally
requires user to perform some action before the payload can be achieved. It is a program that,
unknown to the user, contains instructions that exploit a known vulnerability in some software.
Worm
A worm is a malicious program that propagates itself over a network, reproducing itself
as it goes. Worm allows hackers to hack your complete network from the location. This infection
allows hackers to steal data like credit card numbers, passwords and other personal information.
Worm is critical; it may crash the Operating system.
41
Malicious Applets
A malicious applet is any applet that attacks the local system of a Web surfer. Malicious
applets are written by researchers, crackers, and Net miscreants to annoy and damage Java users.
They can even seriously damage a Java user's machine. These are tiny programs, written in the
popular java computer language, that misuse your computer resources, modify files on the hard
disk, send fake mails or steal passwords. Any applet that performs an action against the will of
the user who invoked it should be considered malicious.
Logic bomb
A logic bomb is a piece of programming code buried within another programme,
designed to perform some malicious act. It is a piece of code intentionally inserted into a
software system that will set off a malicious function when specified conditions are met. For
example, a programmer may hide a piece of code that starts deleting important files of a
company or organization, which will lead problems to the organization.
Software that is inherently malicious, such as logic bombs that execute a certain payload
at a pre-defined time or when some other condition is met. This technique can be used by a virus
or worm to gain momentum and spread before being noticed. Some viruses attack their host
systems on specific dates, such as Wednesday the 12th or Independence Day. Viruses that
activate on certain dates are often called "Time bombs".
Threat
A threat is anything that can disrupt the operation, functioning, integrity, or availability of
a network or system.
War Dialing
These are the programs that automatically dial thousands of telephone numbers in search
of a way in through a modem connection.
Buffer Overflow
It is a technique for crashing or gaining control of a computer by sending too much data
to the buffer in a computer’s memory. This is the type of DoS attack. Data sent to the server at
the rate and volume that exceeds the capacity of the system, it will cause errors and damage the
system.
Password Crackers
It is the software that can guess passwords. Password attacks can be implemented using
several different methods like brute force attacks, Trojan horse programmers. IP spoofing can
yield user accounts and passwords. Password attacks usually refer to repeated attempts to
identify a user password or account.
Virus
A virus is a form of malicious code and as such is potentially disruptive. It may also be
transferred unknowingly from one computer to another. Virus based attack manipulates the
legitimate user to by authentication and access control mechanisms in order to execute the
malicious code injected by the attacker. Virus attacks are often untargeted and spread among
vulnerable systems and users. Virus attacks directly or indirectly decrease the availability of
infected systems by consuming excessive amount of processing power or network bandwidth.
Types of Hackers
The different types of Hackers are
White Hat Hackers
Black Hat Hackers
Blue Hat Hackers
Spy Hackers
42
White Hat Hackers
White hat hackers are hackers who perform hacking for legitimate reasons. These are the
good guys, computer security experts who specialize in penetration testing and other
methodologies to ensure that a company’s information systems are secure. These IT security
professionals rely on a constantly evolving arsenal of technology to battle hackers.
Black Hat Hackers
These are the bad guys, who are typically referred to as just plain hackers. The term is
often used specifically for hackers who break into networks or computers, or create computer
viruses. Black hat hackers continue to technologically outpace white hats. They often manage to
find the path of least resistance, whether due to human error or laziness, or with a new type of
attack. Hacking purists often use the term “crackers” to refer to black hat hackers. Black hats’
motivation is generally to get paid.
Blue Hat Hackers
A blue hat hacker is someone outside computer security consulting firms who is used to
bug-test a system prior to its launch, looking for exploits so they can be closed. Microsoft also
uses the term Blue hat to represent a series of security briefing events
Spy Hackers
Corporations hire hackers to infiltrate the competition and steal trade secrets. They may
hack in from the outside or gain employment in order to act as a mole. Spy hackers may use
similar tactics as hacktivists, but their only agenda is to serve their client’s goals and get paid.
Cracking
The term “cracking” means trying to get into computer systems in order to steal, corrupt,
or illegitimately view data. The popular press refers to such activities as hacking, but hackers see
themselves as expert, elite programmers and maintain that such illegitimate activity should be
called “cracking.”
The term cracker was coined by Richard Stallman. Crackers are unauthorized users who
attempt to obtain unauthorized access to remote systems. The nature of these attacks has changed
substantially over the last few years. Several years ago crackers sat at terminal entering
commands, waiting to see what would happen, and then entering commands. Today most
cracking attacks are automated and take of attack is sometimes called an asymmetric attack.
Pornography
The growth of technology has flip side to it causing multiple problems in everyday life.
Internet has provided a medium for the facilitation of crimes like pornography. Cyber porn as it
is popularly called is widespread. Almost 50% of the web sites exhibit pornographic material on
the Internet today. Pornographic materials can be reproduced more quickly and cheaply on new
media like hard disks, floppy disks and CD-ROM’s.
The new technology is not merely an extension of the existing forms like text,
photographs and images. Apart from still pictures and images, full motion video clips and
complete movies are also available. Another great disadvantage with a media like this is its easy
availability and accessibility to children who can log on to pornographic web sites from their
own houses in relative anonymity and social and legal deterrents associated with physically
purchasing an adult magazine from the stand are no longer present.
Furthermore, there are more serious offences which have universal disapproval like child
pornography and far easier for offenders to hide and propagate trough the medium of the internet.
Software Privacy
A term used to describe the act of illegally using, copying or distributing software
without ownership or legal rights. The majority of software today is purchased as a one-site
license, meaning that only one computer may have that software installed on it at one time.
Copying that software to multiple computers or sharing it with your friend without multiple
licenses is considered software privacy, which is illegal.
43
Computer programs are valuable property and thus the subject of theft from computer
systems. Unauthorized copying of software is illegal because software is intellectual property
that is protected by copy right law and user licensing agreement.
Software privacy is all but impossible to stop, although software companies are launching
more and more lawsuits against major infractors. Originally, software companies tried to stop
software privacy by copy-protecting their software. This strategy failed, however, because it was
inconvenient for users and was not 100 percent foolproof. Most software now requires some sort
of registration, which may discourage would-be pirates, but doesn't really stop software privacy.
An entirely different approach to software privacy called shareware. Shareware allows
user to make copies for others and public domain software, which is not copyrighted. Shareware
publishers encourage users to give copies of programs to friends and colleagues but ask everyone
who uses a program regularly to pay a registration fee to the program's author directly.
Data recovery
Data recovery is the process of handling the data; through the data is damaged, failed,
corrupted or cannot accessible from secondary storage media then it cannot be accessed
normally. The data are being kept in storage media such as internal or external hard disk drives,
pen drive, storage tapes, CDs, DVDs etc. Recovery is needed due to physical damage to the
storage device or logical damage to the file system that prevents it from being mounted by the
host operating system (OS).
The most common data recovery scenario involves an operating system failure,
accidental damage etc; in such case copy all wanted files to another disk. This can be easily done
by using a CD or pen drives. In order to move the files from the system disk to the backup media
file manager or optical disc authoring software is used.
In case of hard disk failure, the data cannot be easily read. The solutions are repairing the
file system, hard disk recovery techniques to recover the corrupted data, hardware-software
based recovery of damaged service areas to hardware replacement on a physically damaged disk.
If the Files erased, then the contents of deleted files are not removed immediately from the drive;
instead, references to them in the directory structure are removed, and the space they occupy is
made available for later overwriting. For the end users, deleted files are not discoverable through
a standard file manager, but that data still technically exists on the drive. In the meantime, the
original file contents remain, often in a number of disconnected fragments, and may be
recoverable. The Data recovery process is also used in forensic applications.
File Modification and File Access
File is a collection of related data records treated as a unit. It is also called as Data set. A
computer file is organized in a particular way with a well defined structure. File management
controls the processes such as file creation, deletion and access.
Files reside on secondary storage. When we want to use this information, it has to be
accessed and brought into main memory. Information in files could be accessed in many ways.
This depends on an application used. There are three file access methods.
44
Sequential Access
It is a simple access method. All the records are kept in some sequence such as numerical
order. Records in this type of file are located one after another according to the given order. The
information in a file is accessed sequentially one record after another. Sequential access is based
on the tape model that is inherently a sequential access device. Sequential access is best suited
where most of the records in a file are to be processed. For example, transaction files.
Direct Access
Direct access file uses a physical medium and programming, which helps in the storage
and retrieval of specific records. These files are the heart of DBMS and most of today’s file
storage technology. Sometimes it is not necessary to process every record in a file. It may not be
necessary to process records in the order in which they are present. Most common device for
storing direct access files is magnetic disk.
Information present in a record can be accessed only if some key value in that record is
known. In all such cases, direct access is used. A file is a collection of physical blocks, and so the
records in any block can be accessed. For example, master files.
Databases are of this type since they allow query processing that involves immediate
access to large amounts of information. Not all operating systems support direct access files.
Usually files are to be defined as sequential or direct at the time of creation and accessed
accordingly later. All reservation systems fall into this category.
Write-through cache
It writes data to both the cache and storage. The advantage to this approach is that newly
written data is always cached, thereby allowing the data to be read quickly. A drawback is that
write operations are not considered to be complete until the data is written to both the cache and
primary storage. This causes write-through caching to introduce latency into write operations.
Write-back cache
It is similar to write-through caching in that all write operations are directed to the cache.
The difference is that once the data is cached, the write operation is considered complete. The
data is later copied from the cache to storage. In this approach, there is low latency for both read
and write operations. The disadvantage is that, depending on the caching mechanism used, the
data may be vulnerable to loss until it is committed to storage.
Steps to retrieve the cache files from different browsers:
Retrieve temporary Internet files from Internet Explorer versions 7 and 8.
Access and open Internet Explorer through your Start menu or by clicking on the icon
directly from your desktop. Click on Tools, then on Internet Options. Click on the
General tab and then click on Settings under the Browsing History section. In Settings,
click on View Files to retrieve and view your temporary Internet files.
Retrieve temporary Internet files from Internet Explorer 6.
Access and open Internet Explorer through your Start menu or by clicking on the icon
directly from your desktop. Click on Tools, then on Internet Options. Click on the
47
General tab and then click on Settings under the Temporary Internet Files section. In
Settings, click on View Files to retrieve and view your temporary Internet files
Retrieve temporary Internet files from Google Chrome.
Type "about:cache" directly into the address bar of Google Chrome. Your temporary
Internet files, or cache content, will then be displayed in the browser window. Depending
on how full your cache is, the data may take a few moments to display.
When setting out to plan for an organization commitment to forensic operations, you
should consider the following:
i) Cost
ii) Response Time
iii) Data sensitivity concerns
48
Costs:
This will include costs such as those for the tools, hardware and other equipment used to
collect and examine digital information, as well as for staffing and training.
Response Time:
While an outside forensic consultant may seem cheaper because the service is only paid
for when actually used, the interruption to normal business operations while the consultant gets
into place and up to speed may turn out to be more expensive than maintaining an in-house
forensic capability.
Data sensitivity concerns:
Forensic data collection can expose highly sensitive information such as personal health
records, credit card information, business plans etc.
Resolving these issues can be challenging, so many organizations divide the forensic functions as
follows:
i) First Response
ii) Analysis and presentation
First Response:
It is used for identifying the sources of relevant digital information and preserving it for
later analysis, using sound process.
Analysis and presentation:
Analyzes the collected information to identify material facts that bear on the subject of
the investigation and prepares and presents the results of the analysis to support possible
legal action.
Firewalls
A firewall is a system designed to prevent unauthorized access to or from a private network.
Firewalls can be implemented in both hardware and software, or a combination of both.
Firewalls are frequently used to prevent unauthorized Internet users from accessing private
networks connected to the Internet, especially intranets. All messages entering or leaving the
intranet pass through the firewall, which examines each message and blocks those that do not
meet the specified security criteria.
Need of Firewalls
Without a firewall, your computer is operating with an "open door" policy. Bank account
information, passwords, credit card numbers, virtually any sensitive information on your
computer becomes available to hackers. Hackers can get in, take what they want, and even leave
one of their own "back doors" in place for ongoing access to your computer whenever they like.
Firewalls have a wide range of capabilities.Types of firewalls include:
Packet filtering firewalls
Stateful inspection firewalls
Proxy firewalls
Guards
Personal firewalls
Packet filter
Packet filtering is “controlling access to a network by analyzing the incoming and outgoing
packets and letting them pass or halting them based on the IP address of the source and
destination. Packet filtering is one technique, among many, for implementing security
firewalls.”i Packet filtering is both a tool and a technique that is a basic building block of
network security. It is a tool in that it is an instrument that aids in accomplishing a task. It is a
49
technique because it is a method of accomplishing a task. In the context of a TCP/IP network, a
packet filter watches each individual IP datagram, decodes the header information of in-bound
and out-bound traffic and then either blocks the datagram from passing or allows the datagram to
pass based upon the contents of the source address, destination address, source port, destination
port and/or connection status. This is based upon certain criteria defined to the packet filtering
tool. The leading IP routers, including Cisco, Bay, and Lucent, can be configured to filter IP
datagrams. Many operating systems can be configured for packet filtering. Packet filtering can
be added to *nix operating systems. Support for packet filtering via ipchains is included by
default in the Linux kernel. Windows NT and Windows 2000 support packet filtering. Virtually
all commercial firewalls support packet filtering. Some commercial firewalls also have the
capability of filtering packets based upon the state of previous packets (stateful inspection).
Purpose of Packet Filter
Packet filtering generally is inexpensive to implement. However it must be understood
that a packet filtering device does not provide the same level of security as an application or
proxy firewall. All except the most trivial of IP networks is composed of IP subnets and contain
routers. Each router is a potential filtering point. Because the cost of the router has already been
absorbed, additional cost for packet filtering is not required. Packet filtering is appropriate where
there are modest security requirements. The internal (private) networks of many organizations
are not highly segmented. Highly sophisticated firewalls are not necessary for isolating one part
of the organization from another. However it is prudent to provide some sort of protection of the
production network from a lab or experimental network. A packet filtering device is a very
appropriate measure for providing isolation of one subnet from another.
Functionality
All packet filters function in the same general fashion. Operating at the network layer and
transport layer of the TCP/IP protocol stack, every packet is examined as it enters the protocol
stack. The network and transport headers are examined closely for the following information:
protocol (IP header, network layer) – In the IP header, byte 9 (remember the byte count begins
with zero) identifies the protocol of the packet. Most filter devices have the capability to
differentiate between TCP, UPD, and ICMP.(TCP-Transmission Control Protocol,UDP-User
Datagram Protocol,Internet Control Message Control)
source address (IP header, network layer) – The source address is the 32-bit IP address of the
host which created the packet.
destination address (IP header, network layer) – The destination address is the 32-bit IP
address of the host the packet is destined for
source port (TCP or UDP header, transport layer) – Each end of a TCP or UDP network
connection is bound to a port. TCP ports are separate and distinct from UDP ports. Ports
numbered below 1024 are reserved – they have a specifically defined use. Ports numbered above
1024 (inclusive) are known as ephemeral ports. They can be used however a vendor chooses. For
a list of “well known” ports, refer to RFP1700. The source port is a pseudo-randomly assigned
ephemeral port number. Thus it is often not very useful to filter on the source port.
destination port (TCP or UDP header, transport layer) – The destination port number
indicates a port that the packet is sent to. Each service on the destination host listens to a port.
Some well-known ports that might be filtered are 20/TCP and 21/TCP - ftp connection/data,
23/TCP - telnet, 80/TCP - http, and 53/TCP - DNS zone transfers.
connection status (TCP header, transport layer) – The connection status tells whether the
packet is the first packet of the network session. The ACK bit in the TCP header is set to “false”
or 0 if this is the first packet in the session. It is simple to disallow a host from establishing a
connection by rejecting or discarding any packets which have the ACK bit set to “false” or 0.
The filtering device compares the values of these fields to rules that have been defined, and
based upon the values and the rules the packet is either passed or discarded. Many filters also
50
allow additional criteria from the link layer to be defined, such as the network interface where
the filtering is to occur.
51
The state table that maintains the connection information may be periodically cleared.
For example, it is cleared when a Firewall policy update is processed or if Symantec Endpoint
Protection services are restarted.
Proxy Firewalls
A Proxy is a central machine on the network that allows other machines in that network
to use a shared Internet connection. Proxy servers are intermediate servers which accept requests
from clients and forward them to other proxy servers, a source server, or service the request from
their own cache. The proxy is also called 'server' or 'gateway'. Proxy allows users on a network to
browse the Web, send files over FTP, and work with E-mail and other Internet services.
A Firewall Proxy provides Internet access to other computers on the network but is
mostly deployed to provide safety or security. It controls the information going in and out the
network. Firewalls are often used to keep the network safe and free of intruders and viruses.
Firewall proxy servers filter, cache, log, and control requests coming from a client. A firewall
proxy is one that is used for restricting connections from a proxy to the outside world or to the
source server inside of the LAN. This is different from a conventional firewall, in that a
conventional firewall restricts connections coming from the outside world.
Functionality
Simply put, proxy are gateway applications used to route Internet and web access from within a
firewall. Proxy servers work by opening a socket on the server and allowing the connection to
pass through. There is often only one computer in a company with direct Internet connection.
Other computers have access to the Internet using that computer as gateway.
A proxy basically does the following:
1. Receives a request from a client inside the firewall
2. Sends this request to the remote server outside of the firewall
3. Reads the response
4. Sends it back to the client
Usually, the same proxy is used by all of the clients on the network. This enables the proxy to
efficiently cache documents that are requested by several clients.
SOCKS4 or SOCKS5 Proxy
In a SOCKS network, all network application data flows through SOCKS, enabling SOCKS to
collect, audit, screen, filter and control the network data, and create a network application data
warehouse.
It is recommended to use SOCKS5 proxy with PostCast Server. SOCKS4 performed three
functions: connection request, proxy server setup and application data relay. SOCKS5 brings
authentication to the table. With authentication, SOCKS5 adds two messages. SOCKS5 makes
configuring clients easier and includes support for UDP and TCP applications such as SNMP and
52
audio/video applications such as RealAudio. It supports communications among networks with
different IP addressing schemes, and supports authentication and encryption.
Tunneling Proxy
Tunneling allows users to perform various Internet tasks despite the restrictions imposed by
firewalls. This is made possible by sending data through HTTP (port 80). Additionally,
Tunneling protocol is very secure, making it indispensable for both average and business
communications. SSL (Secure Sockets Layer) tunneling protocol allows a web proxy server to
act as a tunnel for SSL enhanced protocols. The client makes an HTTP Request to the proxy and
asks for an SSL tunnel. A Tunneling Proxy operates on port 443.
Guard
In information security, a guard is a device or system for allowing computers on otherwise
separate networks to communicate, subject to configured constraints. In many respects a guard is
like a firewall and guards may have similar functionality to a gateway.
Whereas a firewall is designed to limit traffic to certain services, a guard aims to control the
information exchange that the network communication is supporting at the business level.
Further, unlike a firewall a guard provides assurance that it is effective in providing this control
even under attack and failure conditions.
A guard will typically sit between a protected network and an external network, and ensure the
protected network is safe from threats posed by the external network and from leaks of sensitive
information to the external network.
A guard is usually dual-homed, though guards can connect more than two networks, and
acts as a full application layer proxy, engaging in separate communications on each interface. A
guard will pass only the business information carried by the protocols from one network to
another, and then only if the information passes configured checks which provide the required
protection.
Guards were initially designed to control the release of information from classified systems,
protecting the confidentiality of the sensitive information handled by the protected system. Since
then their scope has been extended to cover controls over the import of data, in order to protect
the integrity of information and availability of services in the protected network.
Guards generally provide the following functionality:
source and destination address authentication
source and destination address whitelisting
security label checks against source and destination clearances
data format whitelisting
data format consistency and validity checking
scanning data for known malware
validation of digital signatures
inspection of encrypted content
checking text against a blacklist of phrases
removal of redundant data
generation of logs recording security relevant events
self-test mechanisms
Personal firewall
A personal firewall is an application which controls network traffic to and from a
computer, permitting or denying communications based on a security policy. Typically it works
as an application layer firewall.
A personal firewall differs from a conventional firewall in terms of scale. A personal
firewall will usually protect only the computer on which it is installed, as compared to a
conventional firewall which is normally installed on a designated interface between two or more
networks, such as a router or proxy server. Hence, personal firewalls allow a security policy to
53
be defined for individual computers, whereas a conventional firewall controls the policy between
the networks that it connects.
The per-computer scope of personal firewalls is useful to protect machines that are
moved across different networks. For example, a laptop computer may be used on a
trusted intranet at a workplace where minimal protection is needed as a conventional firewall is
already in place, and services that require open ports such as file and printer sharing are useful.
The same laptop could be used at public Wi-Fi hotspots, where strict security is required to
protect from malicious activity. Most personal firewalls will prompt the user when a new
network is connected for the first time to decide the level of trust, and can set individual security
policies for each network.
Unlike network firewalls, many personal firewalls are able to control network traffic
allowed to programs on the firewalled computer. When an application attempts an outbound
connection, the firewall may block it if blacklisted, or ask the user whether to blacklist it if it is
not yet known. This protects against malware implemented as an executable program. Personal
firewalls may also provide some level of intrusion detection, allowing the software to terminate
or block connectivity where it suspects an intrusion is being attempted.
Proof by Knowledge
A password is associated with each user or entity.Password are shared secrets between user and
system.To gain access to the system,the user enters a user ID and password.The system
authenticates the user if the password matches with that stored in the system corresponding to user
ID.There are different ways to store passwords in the system.
Clear passwords:The system stores passwords in clear text in clear text in password file,which is
‘read’and ‘write’ protected form users.It provides no protection from system administrator or super
54
user.Stroage of password files on backup media also poses security risk.
Encrypted password:A one-way functions of passwords are stored instead of clear
passwords.When a user enters the password,the system computers one-way function of the
password and compares with that stored in the system.
Threats on Passwords
Replay:An adversary records the password when it is transmitted in clear text over the
communication line.The recorded password is subsequently used to impersonate.
Brute-force attack:An adversary tries all possible passwords,one at a time in the hope to uncover
the correct password.The feasibility of the attack depends on number of trials required and the time
taken for each trial.
Password guessing:The adversary guesses the passwords by trying names of user’s family
members or proper names.
Dictionary attacks:The adversary tries to match the password with dictionary words.Apart from
standard dictionary,one line dictionaries of words from forewign languages,specialized words from
music and flims are also available.Dictionary attack is generally not successful on a single user’s
password,but it may uncover a weak password to gain access to system.
Safeguards
a) Password rules are imposed to prevent use of weak password such as:
_Minimum length of passwords and allowable set of characters,uppercase,numeric,non-
alphanumeric are specified.
--The password ageing time frames are specified to enforce change in passwords.
Proof by Possession
A user presents physical token that the system can recognize as belonging to him such as a banking
card,smart card or ATM card.Personal Identification Numbers are often used along with physical
token to identify the user.To prevent brute force attack on PIN,the machine-confiscate the card by
locking it and deactivates it if three unsuccessful attempts are made to enter the PIN.
PINs are second level of security in case the card is lost or stolen.However,since users often
do not keep the two things separate,theft is a regular occurrence in this case.
Proof by Property
Biometric techniques relay on measuring readily accessible and reliable unique characteristics of
users such as fingerprints,written signatures,voice patterns,retinal scans,face geometry and hand
geometry.When the system needs to authenticate the user,the system obtains a biometric measure of
the user and then compares it against that stored in the database.
Authentication
Authentication is the process of determining if a user or identity is who they claim to be.
Authentication is accomplished using something the user knows (e.g. password), something the
user has (e.g. security token) or something of the user (e.g. biometric).
The authentication process is based on a measure of risk. High risk systems, applications
and information require different forms of authentication that more accurately confirm the user's
digital identity as being who they claim to be than would a low risk application, where the
confirmation of the digital identity is not as important from a risk perspective. This is commonly
55
referred to as "stronger authentication".
Authentication processes are dependant upon identity verification and registration
processes. For example, when Jane Doe is hired at an enterprise, she provides the enterprise with
information and tokens of who she is (e.g. name, address, driver's license, birth certificate, a SSN
number, a passport, etc.). The enterprise may choose to immediately accept this information or, it
may instead chose to run background checks on Jane to see if she is who she claims to be and
determine if she has any criminal record. When the checks come back favorably, the enterprise
will accept her identity and enter her into their systems. The identity registration process will
usually involve issuing Jane with enterprise authentication mechanisms such as id and password,
security token, digital certificate and/or registering some of her biometrics.
The authentication process is totally dependent on the identity validation and registration
process used for Jane. If Jane presents false tokens, which are accepted by the enterprise, then
the person acting as Jane will be positively authenticated every time, even though she is not the
real Jane Doe. Authentication security therefore is only as good as the weakest link in the chain.
General Authentication
Password Authentication
Password authentication is the most common method of authentication. It is also the least
secure. Password authentication requires the identity to input a user id and a password in order to
login. Password length, type of characters used and password duration are password management
are now critical concern in enterprises. The ability to easily crack passwords has resulted in high
levels of identity theft. As a result, the high risk of passwords means most enterprises now
deploy a layered security strategy. A user enters in their id and password for initial login to gain
access to only low risk information and applications with other forms of authentication required
for higher risk information and applications.
Single Sign On Authentication
Single Sign On (SSO), Reduced Sign On (RSO), or Enterprise Single Sign On (ESSO) is
the ability to reduce the number of id's and passwords a user has to remember. In most
enterprises, a strong business case can be made to implement single sign on by reducing the
number of password related help desk calls. SSO is also the architecture to require stronger
forms of authentication for higher risk information and applications. Thus a user may login using
their id and password to gain general low risk access to an enterprise. The SSO software enables
them to not have to use multiple id's and passwords. However, when the user tries to access more
sensitive information and applications, the single sign on software will require the identity to
input stronger authentication such as a security token, a digital certificate and/or a biometric.
Lightweight Directory Access Protocol (LDAP) Authentication
Most enterprises use Lightweight Directory Access Protocol (LDAP) directories to
handle the centralized authentication. LDAP directories, such as Active Directory, Sun One
Directory, Novel e-Directory and other vendors, provide a low cost way of doing fast identity
look-ups and authentication as compared to traditional databases. Today it is also common to use
virtual LDAP directories to quickly integrate the identity and authentication information
contained in one or more databases and/or other LDAP directories. The use of these directories is
a critical piece of identity infrastructure that leads to integrating access control.
Access Control Authentication
Access control is the process of granting an identity the ability to physically or
electronically access a facility or enterprise. By using LDAP directories and single sign on, many
enterprises now integrate their building access control security cards, employee time keeping and
other access control accessories into their LDAP identity management system. This reduces the
number of identity database silos, since most access control systems use their own identity
databases. It also reduces the number of access control accessory systems.
56
Network Authentication
Network authentication is the process of granting an identity the ability authenticate to a
network as well as their authorization. Almost all network authentication systems are now LDAP
based. This includes Microsoft 2000, Linux, Solaris, AIX and HPUX. Many mainframe
authentication systems such as RACF are now LDAP enabled.
Biometric Authentication
Biometric authentication s is the process of taking a "piece of you", digitizing it and then
using this to authenticate against an identity directory or database. Typical types of biometric
authentications include finger scans, digital finger prints, hand scans, retina scans, digital
signature scans and others. The use of DNA biometrics is increasingly used in identity
verification (the initial identity registration step prior to authentication). Biometrics are
commonly used as part of an array of authentication methods used in enterprises.
Strong Authentication
Strong authentication means higher trust of an authentication. For instance, the successful
login using a id and password will be given a low level of trust by the enterprise since the id and
password are easily obtained by social engineering or password cracking. Stronger authentication
methods include digital certificates, security tokens and biometrics. Often, many enterprises use
combinations of these including passwords, to place a higher degree of trust for higher risk
applications or information access.
Transaction Authentication
Transaction authentication is the process of using other authentication determinants to
verify an identity. Often used by financial institutions for higher risk customers or transactions,
the transaction software looks at the IP address the user is coming in on, the identity's computer
hardware they're using, the time of day, the geo-location the identity is coming from, etc. If the
identity successfully logs on using a id and password BUT the other components are not usual,
the transaction authentication software may stop a process, flag in real time an administrator
and/or ask the user more questions to have more confidence the identity is who they claim to be.
Federated Authentication
Federated authentication is the ability to trust an incoming electronic identity to the
enterprise from a trusted partner or website. Protocols enabling this include SAML, Liberty
Alliance, Web Services Federation and Shibboleth. When combined with enterprise single sign
on systems, the user experience is improved since they no longer have to remember another id
and password. Further, enterprise identity authentication standards can be automatically enforced
on external identities using the enterprise systems. Identity authentication federation also works
in reverse for enterprise employees who access there 401k, benefits, etc, to outside supplier
websites. By using federated authentication, the identity doesn't need to remember another
separate id and password.
PKI Authentication
Public key infrastructure (PKI) authentication, is another way of doing identity
authentication. An identity is given a digital certificate by an Certificate Authority (CA). This is
then presented during the authentication process to verify an identity is who they say they are.
The level of authentication trust varies for digital certificates depending on the level of identity
verification done during the identity registration process as well as the digital certificate
revocation process. Digital certificates are becoming more important to authenticate and verify
an identity in single sign on systems, document management systems and in web services.
Security Token Authentication
Security token authentication, such as RSA secureID tokens, are used to authenticate an
identity (something that you have). During the login process, or if required by a single sign on
system for a higher risk application, the identity is required to enter in the numbers appearing on
57
the token screen along with their id. Since the numbers change randomly to the user viewing the
screen (but is understood by the central authentication server), there is a higher degree of trust
associated with this form of authentication. However, operating costs for security authentication
tokens are higher than the use of password and id since they must be physically issued, replaced
and recovered.
Smart Card Authentication
Smart cards are another form of authentication token (something you have). Often they
contain a digital certificate as well as additional identity attribute information. Smart card
authentication is becoming wide spread. The same smart cards used in an authentication process
are now commonly used as well for access control mechanisms to enter physical facilities,
buildings, floors and rooms.
Authentication Management
Authentication management is the overall process of managing identities and their
authentication mechanisms. In most enterprise authentication management involves
authentication policies and processes to manage passwords, digital certificates, security tokens,
access control, biometrics, smart cards, LDAP directories, transaction authentication, single sign
on and identity authentication federation. Strong business cases can be made to lower
authentication costs while at the same time strengthening overall enterprise security.
Wireless Authentication
Authenticating wireless devices is today becoming a main enterprise security
issue. Often, the authentication used is very insecure or easily breached. There are however
ways to increase reliability that the user is who they claim to be by using multi-factor
authentication.
Document Authentication
Formely separate document authentication systems are now becoming intertwined with
enterprise identity and authentication mechanisms. Gone are the days of relying upon mostly
passwords to authenticate users trying to open document. Formerly separate document
authentication systems are now becoming intertwined with enterprise identity and authentication
mechanisms. Gone are the days of relying upon mostly passwords to authenticate users trying to
open documents.
Outsourcing Authentication
Many modern enterprises have outsourced portions of their authentication development,
maintenance and troubleshooting. If done well it can save the enterprise money. If done poorly,
it can create security holes or, cause enterprise failures.
Firewalls implement the authentication process:
Most operating systems are equipped with authentication schemes.Web servers can be
configured to authenticate clients who want to access certain protected content.Firewalls,too,can
perform user authentication.In fact,many organizations depend on firewalls to provide more
secure authentication than conventional systems.Authentication is a key function because
firewalls exist to give external users access to protected resources.
A firewalls uses authentication to identify individuals so that it can apply rules that have
been associated with those individuals.Some firewalls use authentication to give employees
access to common resources such as the web or file transfer protocol(FTP).Some identify the
user associated with a particular IP address;after the user is authorized,the IP address can then be
used to send and receive information with hosts on the internal network.
The exact steps that firewalls follow to authenticate users may vary,but the general process is the
same:
1. Client makes request to access a resource
2. Firewall intercepts the request and prompts the user for name and password
3. User submits information to firewall
58
4. User is authenticated
5. Request is checked against firewall’s rule base
6. If request matches existing allow rule, user is granted access
7. User accesses desired resources
The “plain English”version of the exchange between external client and authenticating firewall is
illustrated in figure
Strong Authentication
Passkeys:User password is mapped to a one-way has-function to generate a cryptographic key.
Such password-derived keys are known as passkeys.The passkey is used to secure
communication link between user and the system.
One time passwords:A special equipment generates a pseudorandom number which is used as
password.The password is changed every minute and is time synchronized to the database stored
in the computer.This method is expensive because of the additional hardware.
Challenge response protocol:In proof of knowledge method using passwords,the user discloses
the passwords to prove the knowledge of the shared secrete.Whereas,in the challenge-response
method,a user provides his/her identity by responding correctly to the challenge asked by the
verifier.For example,the user and the system agree on function f=x2+5.when the user logs in,the
system randomly selects a number say 10 and sends it to user,the user has to reply with number
105 for valid authentication.
Protected Password
A strong password is one that’s hard to crack. A strong password must have all of the following:
Your password must be no fewer than eight (8) characters in length. However, a good choice
is a "pass phrase" composed of four (4) words and punctuation. A pass phrase is a longer
version of a password and is therefore more secure. A pass phrase is typically composed of
multiple words.
o Note: Though technology constraints may impose maximum length or other restrictions,
use of pass phrases shall be supported where possible and practical.
o Examples of pass phrases:
I like ice cream.
Turn Off Cell Phones!
It was hot today.
59
Cal Poly Broncos rule!
At least three of the following four types of characters:
o It must have at least one number.
o It must have at least one uppercase letter.
o It must have at least one lowercase letter.
o It must have at least one symbol (!,@,#,$,^).
Examples of Extremely Bad Passwords
Your name in any form - first, middle, last, maiden, spelled backwards, nickname or initials
Your user ID or your user ID spelled backwards
Part of your user ID or name
Any common name, such as Joe
The name of a close relative, friend or pet
Your phone number, office number or address
Your birthday or anniversary date
Simple variants of names or words (even foreign words), simple patterns, famous equations
or well-known values
Your favorite sports team (NFL, NBA, MLB, etc.)
Your license plate number, your social security number or any all-numeral password
Names from popular culture (e.g.: Beatles, Spiderman, etc.)
Creating a Stronger Password
You should follow these guidelines when creating a password:
Do not use your user name or any part of your real name.
Do not use a single word in a common language. There are tools for hackers that search
through electronic dictionaries, trying every word.
Avoid characters other than those above, such as accented characters (áèôü) or characters
from other alphabets (Ρωσικά, Греческий). The basic system will handle these passwords,
but you may not be able to enter them correctly on web pages.
Spell a word backwards (anomopyloplac1#).
Insert a number (calpo7lyPomona) or punctuation (go!Broncos).
Use weird capitalization (remember that it counts), or combine words (broNCOsrOOL!)).
Use the first letters of each word in a phrase (“I can never remember my stupid password!” =
Icnrmsp!).
Combine things you will remember ("I like to eat broccoli and listen to Beethoven =
broCColi@bEEthoven).
Consider using a pass phrase instead of a password.
Password Managers
A password manager is software for storing all your passwords in one location that is
protected and accessible with one easy-to-remember master passphrase. It is one of the best ways
to keep track of each unique password or passphrase that you have created for your various
online accounts—without writing them down on a piece of paper and risking that others will see
them. When using a password manager, you have one master passphrase that protects all of your
other passwords. This leaves you with the ease of having to remember only one.
Access Control
Access control is the process by which users are identified and granted certain privileges
to information,systems,or resources.Understanding the basics of access control is fundamental to
understanding how to manage proper disclosure of information.
Controlling how network resources are accessed is paramount to protecting private and
confidential information from unauthorized users.the type of access control machanisms
available for information technology initiatives today continue to increase.most access control
methodologies are based on the same underlying principles.if you understand the underlying
concepts and principles,you can apply this understanding to new products and technologies and
shorten the learning curve,so you can keep pace with new technology initiatives.
Access control devices properly identify people,and verify their identity through an
authentication process, so that they can be held accountable for their actions.good access control
systems record and timestamp all communications and transactions so that access to systems and
information can be audited at later dates.
Reputable access control systems provide authentication,authorization,and
administration.authentication is a process in which users are challenged for identity credentials
so that it is possible to verify that they are who they say they are.once a user has been
authenticated,authorization determines what resources a user is allowed to access.A user can be
authenticated to a network domain,but only be authorized to access one system or file within that
domain.administration refers to the ability to add,delete,and modify user accounts and user
account privileges.
Objectives of Access Control
The objective of access control is to preserve and protect the confidentiality,integrity,and
availability of information,systems,and resources.confidentiality refers to the assurance that only
authorized individuals are able to view and access data and systems.integrity refers to protecting
the data from unauthorized modification.you can have confientiality without integrity and vice
versa.it is important that only the right people have access to the data,but it is also important that
the data is the right data,and not data that have been modified either accidentally or on purpose.
Data availability is also the important security service.while data and resources need to be
secure,they also need to be accessible and available in a timely manner.if you have to open 10
locked safes to obtain a piece of data,the data is not very available in a timely fashion.while
availability may seem obvious,it is important to acknowledge that it is a goal so that security is
not overdone to the point where the data is of no use to anyone.
62
Types of Access Control
There are four types of access control.they are as follows:
Discretionary access control systems
Mandatory access control systems
Role-based access control systems
Rule-based access control systems
Discretionary access control systems allow the owner of the information to decide who can
read,write,and execute a particular file or service.when users create and modify files in their own
home directories,their ability to do this is because they have been granted discretionary access
control over the files that they own.on end-user laptops and desktops,discretionary access control
systems are prevalent.
Mandatory access control systems do not allow the creator of the information to govern who
can access it or modify data.administrators and overseeing authorities predetermine who can
access and modify data,systems,and resources.madatory access control systems are commonly
used in military installation,financial institutions,and in medical institutions.
Role-based access control systems allow users to access systems and information based on
their role within the organization.it allows end-users access to information and resources based
on their role within the organization.role-based access can be applied to groups of people or
individuals.for example,you can allow everyone in a group named sysadmin access to privileged
resources.
Rule-based access control systems allow users to access systems and information based on
predetermined and configured rules.rules can be established that allow access to all end-users
coming from a particular domain,host,network,or IP addresses.if an employee changes his role
within the organization, his existing authentication credentials remain in effect and do not need
to be re-configured.using rules in conjunction with roles adds greater flexibility.
63
An access control matrix should be thought of only as an abstract model of permissions
at a given point in time;a literal implementation of it as a two-dimensional array would have
excessive memory requirements.capability-based security and access control lists are categories
of concrete access control mechanisms whose static permissions can be modelled using access
control matrices.although these two mechanisms have sometimes been presented as simply row-
based and column-based implementations of the access control matirx,this view has been
criticized as drawing a misleading equivalence between systems that do not take into account
dynamic behaviour.rules can be applied to people,as well as devices.
Evidence
The Indian Evidence Act, originally passed in India by the Imperial Legislative Council
in 1872, during the British Raj, contains a set of rules and allied issues governing admissibility of
evidence in the Indian courts of law.
The enactment and adoption of the Indian Evidence Act was a path-breaking judicial
measure introduced in India, which changed the entire system of concepts pertaining to
admissibility of evidences in the Indian courts of law. Until then, the rules of evidences were
based on the traditional legal systems of different social groups and communities of India and
were different for different people depending on caste, religious faith and social position. The
Indian Evidence Act introduced a standard set of law applicable to all Indians.
The law is mainly based upon the firm work by Sir James Fitzjames Stephen, who could
be called the founding father of this comprehensive piece of legislation.
Law of Electronic Evidence
In the past decade or two, e-commerce has seen a huge boom. Everything from Harry
Potter books to plots of land can be bought online these days. At the same time, the use of closed
circuit televisions (“CCTV”) to nab thieves and other miscreants has increased in shopping
complexes and other public places, where instead of guards being posted at multiple places, one
guard sits at a counter and keeps watch over the entire place through the CCTV recordings. Thus,
both in civil as well as criminal matters, technology is assuming an increasingly important role to
play.
In the case of electronic contracts, the proof of the transactions actually taking place is
available only on emails, often signed with electronic signatures. In criminal proceedings, the
prosecution can now use electronic evidence to prove the guilt of the accused.
However, the progression from an age of no technology to its admissibility in the court of
law has come gradually over a period of time, causing paradigm shifts in many fundamental
principles of the law of evidence. In this paper, the researcher seeks to show the shift that has
occurred with respect to electronic evidence within two important rules of evidence – that of
hearsay and that of primary evidence. The researcher looks at the earlier position of law in this
regard, the reason for subsequent change, the amendments to law, and a few possible effects of
such amendment.
Admissible and Relevant Evidence
The law of evidence has long been guided by the rule of “best evidence” which is
considered to have two basic paradigms – avoidance of hearsay and production of primary
evidence. These rules are believed to weed out infirm evidence and produce only that which
cannot be reasonably be doubted. In light of the Indian Evidence Act, 1872, this can be
understood as only a person who has himself perceived the fact being proved can depose with
respect to it, and not someone who has received the information second hand. Similarly, where a
document is to be used to prove a point, the original should be produced in court, and not a copy
or photograph or any other reproduction of the same, not even statements regarding the contents
by someone who has seen it. For any reproduction of a statement or document is lower on the
rung of authenticity than the original, giving opportunities for fraud or fabrication.
Hearsay has been defined as “all the evidence which does not derive its value solely from
64
the credit given to the witness himself, but which rests also in part on the veracity and
competence of some other person”. Thus, if a person A chooses to depose in court that person B
told him that he had seen person C stabbing person D, person A’s statements with respect to the
act of stabbing that occurred will be hearsay, since it is not completely out of his own knowledge,
but based partly on what person B told him. However, person B’s evidence will be direct
evidence since he saw the act happening with his own eyes. If, on the other hand, person A’s
deposition were to be in respect of whether or not person B had seen the act happen, his
statements would be direct evidence, since he had himself heard person B say so. Thus, it is the
purpose for which a statement is being used that qualifies it as hearsay or not.
Primary evidence is the original document being itself produced for inspection by the
court. A document has been defined as any matter which has expressed or described upon any
substance by means of letters, marks or figures for the purpose of recording that matter. Thus, a
certificate of age, an inscription on a stone plaque, a caricature or photograph, a map, are all
documents of various forms. If a copy is made of such a document, it will not be primary
evidence since it is not the original. Copies of the original document are considered secondary
evidence. Secondary evidence is acceptable in court only under certain conditions, such as when
the original is in the possession of the adversary or when the original is destroyed or lost, or
when the original is of such a nature that it cannot be easily moved. So long as evidence is direct
and not hearsay in nature, or is primary evidence, the court may accept it, provided that the fact
being proved through such evidence proves the existence or non-existence of fact in issue to be
probable in the past, presence or future, that is to say, it is a relevant fact. The Indian Evidence
Act has set out a number of conditions under which a fact can be considered relevant. In other
words, the condition for admissibility of a piece of evidence is that it should prove a relevant fact.
Risk of Manipulation
While allowing all forms of computer output to be admissible as primary evidence, the
statute has overlooked the risk of manipulation. Tampering with electronic evidence is not very
difficult and miscreants may find it easy to change records which are to be submitted in court.
However, technology itself has solutions for such problems. Computer forensics has developed
enough to find ways of cross checking whether an electronic record has been tampered with,
when and in what manner.
““C
CYYB
BEER
R SSEEC
CUUR
RIIT
TYY IISS A
A SSH
HAAR
REED
DRREESSPPO
ONNSSIIB
BIILLIIT
TYY,, A
ANND
D IIT
TBBO
OIILLSS D
DOOW
WNN
T
TOOT
THHIISS:: IIN
NCCY
YBBEER
R SSEEC
CUUR
RIIT
TYY,, T
THHEE M
MOOR
REE SSY
YSST
TEEM
MSS W
WEE SSEEC
CUUR
REE,, T
THHEE
M
MOOR
REE SSEEC
CUUR
REE W
WEE A
ALLLL A
ARREE””
- JEH JOHNSON
68